CVE-2021-45756

Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
References
Link Resource
http://asus.com Vendor Advisory
http://rt-ac68u.com Broken Link URL Repurposed
https://github.com/IBUILI/Asus Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://rt-ac68u.com - Broken Link () http://rt-ac68u.com - Broken Link, URL Repurposed

29 Mar 2022, 17:18

Type Values Removed Values Added
First Time Asus rt-ac68u
Asus rt-ac5300
Asus rt-ac5300 Firmware
Asus rt-ac68u Firmware
Asus
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (MISC) http://rt-ac68u.com - (MISC) http://rt-ac68u.com - Broken Link
References (MISC) https://github.com/IBUILI/Asus - (MISC) https://github.com/IBUILI/Asus - Exploit, Third Party Advisory
References (MISC) http://asus.com - (MISC) http://asus.com - Vendor Advisory
CPE cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*
CWE CWE-120

23 Mar 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-23 11:15

Updated : 2024-02-14 01:17


NVD link : CVE-2021-45756

Mitre link : CVE-2021-45756

CVE.ORG link : CVE-2021-45756


JSON object : View

Products Affected

asus

  • rt-ac5300
  • rt-ac68u_firmware
  • rt-ac68u
  • rt-ac5300_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')