ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5431-d23be-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-01-03 02:15
Updated : 2022-01-10 13:35
NVD link : CVE-2021-44158
Mitre link : CVE-2021-44158
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
asus
- rt-ax56u_firmware
- rt-ax56u