CVE-2024-33278
- EPSS 8.09%
- Veröffentlicht 24.06.2024 14:15:11
- Zuletzt bearbeitet 21.11.2024 09:16:45
Buffer Overflow vulnerability in ASUS router RT-AX88U with firmware versions v3.0.0.4.388_24198 allows a remote attacker to execute arbitrary code via the connection_state_machine due to improper length validation for the cookie field.
CVE-2024-3079
- EPSS 3.55%
- Veröffentlicht 14.06.2024 03:15:13
- Zuletzt bearbeitet 21.11.2024 09:28:51
Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device.
CVE-2024-3080
- EPSS 57.88%
- Veröffentlicht 14.06.2024 03:15:13
- Zuletzt bearbeitet 21.11.2024 09:28:51
Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device.
CVE-2023-41349
- EPSS 0.31%
- Veröffentlicht 18.09.2023 03:15:08
- Zuletzt bearbeitet 21.11.2024 08:21:07
ASUS router RT-AX88U has a vulnerability of using externally controllable format strings within its Advanced Open VPN function. An authenticated remote attacker can exploit the exported OpenVPN configuration to execute an externally-controlled forma...
CVE-2023-34360
- EPSS 0.04%
- Veröffentlicht 31.07.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 08:07:05
A stored cross-site scripting (XSS) issue was discovered within the Custom User Icons functionality of ASUS RT-AX88U running firmware versions 3.0.0.4.388.23110 and prior. After a remote attacker logging in device with regular user privilege, the re...
CVE-2023-34358
- EPSS 0.27%
- Veröffentlicht 31.07.2023 05:15:09
- Zuletzt bearbeitet 21.11.2024 08:07:05
ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to a device which contains a specific user agent, causing the httpd binary to crash during a string comparison performed with...
CVE-2023-34359
- EPSS 0.27%
- Veröffentlicht 31.07.2023 05:15:09
- Zuletzt bearbeitet 21.11.2024 08:07:05
ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to the device which causes the httpd binary to crash within the "do_json_decode()" function of ej.c, resulting in a DoS condi...
CVE-2021-41437
- EPSS 1.21%
- Veröffentlicht 26.09.2022 14:15:09
- Zuletzt bearbeitet 21.05.2025 19:15:55
An HTTP response splitting attack in web application in ASUS RT-AX88U before v3.0.0.4.388.20558 allows an attacker to craft a specific URL that if an authenticated victim visits it, the URL will give access to the cloud storage of the attacker.
- EPSS 0.52%
- Veröffentlicht 05.07.2022 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:29:39
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stor...
CVE-2022-26673
- EPSS 0.21%
- Veröffentlicht 22.04.2022 07:15:07
- Zuletzt bearbeitet 21.11.2024 06:54:18
ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.