CVE-2021-41435

A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asus:gt-ax11000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:gt-ax11000:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:asus:rt-ax56u_v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax56u_v2:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:asus:rt-ax82u_gundam_edition_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax82u_gundam_edition:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:asus:rt-ax86s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax86s:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:asus:rt-ax86u_zaku_ii_edition_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax86u_zaku_ii_edition:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:asus:rt-ax92u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax92u:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:asus:tuf_gaming_ax3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:tuf_gaming_ax3000:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:asus:tuf-ax5400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:tuf-ax5400:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:asus:zenwifi_xd6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:zenwifi_xd6:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:asus:zenwifi_ax_\(xt8\)_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:zenwifi_ax_\(xt8\):-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*

Information

Published : 2021-11-19 04:15

Updated : 2021-11-23 10:29


NVD link : CVE-2021-41435

Mitre link : CVE-2021-41435


JSON object : View

CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

Advertisement

dedicated server usa

Products Affected

asus

  • rt-ax82u
  • rt-ax68u
  • zenwifi_xd6_firmware
  • rt-ax92u
  • rt-ax82u_gundam_edition
  • rt-ax55
  • rt-ax86u_zaku_ii_edition_firmware
  • rt-ax82u_gundam_edition_firmware
  • rt-ax56u_v2
  • rt-ax86s
  • tuf-ax5400
  • zenwifi_xd6
  • rt-ax82u_firmware
  • rt-ax88u_firmware
  • rt-ax3000_firmware
  • rt-ax86u_zaku_ii_edition
  • gt-ax11000
  • rt-ax92u_firmware
  • rt-ax68u_firmware
  • rt-ax58u
  • rt-ax88u
  • rt-ax58u_firmware
  • rt-ax56u_v2_firmware
  • tuf_gaming_ax3000_firmware
  • rt-ax86u
  • rt-ax3000
  • rt-ax56u_firmware
  • zenwifi_ax_\(xt8\)
  • rt-ax56u
  • gt-ax11000_firmware
  • tuf_gaming_ax3000
  • rt-ax86u_firmware
  • tuf-ax5400_firmware
  • rt-ax86s_firmware
  • zenwifi_ax_\(xt8\)_firmware
  • rt-ax55_firmware