Asus

Rt-ax56u V2 Firmware

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.38%
  • Veröffentlicht 07.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:14:58

It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnera...

  • EPSS 0.85%
  • Veröffentlicht 07.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:14:58

It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can explo...

  • EPSS 0.85%
  • Veröffentlicht 07.09.2023 08:15:07
  • Zuletzt bearbeitet 21.11.2024 08:14:58

It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privil...

  • EPSS 1.06%
  • Veröffentlicht 21.07.2023 08:15:09
  • Zuletzt bearbeitet 21.11.2024 08:07:57

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking validation for a specific value when calling cm_processChangedConfigMsg in ccm_processREQ_CHANGED_CONFIG function in AiMesh system...

  • EPSS 75.12%
  • Veröffentlicht 21.07.2023 07:15:10
  • Zuletzt bearbeitet 21.11.2024 08:07:56

It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote ...

  • EPSS 1.85%
  • Veröffentlicht 19.11.2021 12:15:09
  • Zuletzt bearbeitet 21.11.2024 06:26:14

A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX...

  • EPSS 4.58%
  • Veröffentlicht 19.11.2021 12:15:09
  • Zuletzt bearbeitet 21.11.2024 06:26:15

An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF ...