Asus

Rt-ac86u Firmware

21 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.06%
  • Published 21.07.2023 08:15:09
  • Last modified 21.11.2024 08:07:57

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking validation for a specific value when calling cm_processChangedConfigMsg in ccm_processREQ_CHANGED_CONFIG function in AiMesh system...

  • EPSS 75.12%
  • Published 21.07.2023 07:15:10
  • Last modified 21.11.2024 08:07:56

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote ...

  • EPSS 0.41%
  • Published 02.06.2023 11:15:10
  • Last modified 21.11.2024 07:55:50

ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary...

  • EPSS 1.08%
  • Published 02.06.2023 11:15:10
  • Last modified 21.11.2024 07:55:50

ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands, disrupt syste...

Exploit
  • EPSS 0.52%
  • Published 05.07.2022 12:15:07
  • Last modified 21.11.2024 06:29:39

ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stor...

  • EPSS 0.22%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:52:24

ASUS RT-AC86U’s LPD service has insufficient filtering for special characters in the user request, which allows an unauthenticated LAN attacker to perform command injection attack, execute arbitrary commands and disrupt or terminate service.

  • EPSS 0.08%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:52:24

ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operat...

  • EPSS 0.06%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:52:24

ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.

  • EPSS 2.48%
  • Published 12.04.2021 19:15:14
  • Last modified 21.11.2024 06:20:56

In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its up...

  • EPSS 5.83%
  • Published 20.04.2018 20:29:00
  • Last modified 21.11.2024 04:14:23

ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware bef...