First published: Thu May 06 2021(Updated: )
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<3.0.0.4.386.42643 | ||
ASUS GT-AC2900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-32030.
The severity of CVE-2021-32030 is critical with a severity value of 9.8.
CVE-2021-32030 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface.
ASUS GT-AC2900 devices before version 3.0.0.4.386.42643 are affected by CVE-2021-32030.
To fix CVE-2021-32030, you should update your ASUS GT-AC2900 device to version 3.0.0.4.386.42643 or later.