First published: Thu Oct 06 2022(Updated: )
A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266. This vulnerability is caused by the strcat function called by "caupload" input handle function allowing the user to enter 0xFFFF bytes into the stack. This vulnerability allows an attacker to execute commands remotely. The vulnerability requires authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax56u Firmware | =3.0.0.4.386.44266 | |
ASUS RT-AX56U |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40556 is a stack overflow vulnerability in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266.
CVE-2021-40556 has a severity score of 8.8 (high).
CVE-2021-40556 affects ASUS RT-AX56U Router Version 3.0.0.4.386.44266 firmware.
To fix CVE-2021-40556, update your ASUS RT-AX56U Router firmware to the latest version provided by the manufacturer.
You can find more information about CVE-2021-40556 on the ASUS website and the provided reference links.