First published: Fri Nov 19 2021(Updated: )
An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ASUS ROG Rapture GT-AX11000 Firmware | <3.0.0.4.386.45898 | |
ASUS GT-AX11000 Firmware | ||
All of | ||
ASUS TUF Gaming AX3000 V2 Firmware | <3.0.0.4.386.45898 | |
ASUS routers | ||
All of | ||
ASUS RT-AX55 Firmware | <3.0.0.4.386.45898 | |
ASUS routers | ||
All of | ||
ASUS RT-AX56U V2 firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX56U firmware | ||
All of | ||
ASUS RT-AX56U V2 firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX56U V2 firmware | ||
All of | ||
ASUS RT-AX58U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX58U Firmware | ||
All of | ||
Asus RT-AX82U firmware | <3.0.0.4.386.45898 | |
Asus RT-AX82U firmware | ||
All of | ||
ASUS RT-AX82U GUNDAM EDITION | <3.0.0.4.386.45898 | |
ASUS RT-AX82U GUNDAM EDITION | ||
All of | ||
ASUS RT-AX86U ZAKU II EDITION firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX86 | ||
All of | ||
ASUS RT-AX86S | <3.0.0.4.386.45898 | |
ASUS RT-AX86S firmware | ||
All of | ||
ASUS RT-AX86U ZAKU II EDITION | <3.0.0.4.386.45898 | |
ASUS RT-AX86U ZAKU II EDITION firmware | ||
All of | ||
ASUS RT-AX88U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX88U Firmware | ||
All of | ||
ASUS RT-AX92U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX92U Firmware | ||
All of | ||
ASUS TUF Gaming AX3000 | <3.0.0.4.386.45898 | |
ASUS TUF Gaming AX3000 firmware | ||
All of | ||
ASUS TUF Gaming AX5400 | <3.0.0.4.386.45898 | |
ASUS TUF-AX5400 firmware | ||
All of | ||
Asus XD6 Firmware | <3.0.0.4.386.45898 | |
ASUS ZenWiFi XD6 Firmware | ||
All of | ||
ASUS ZenWiFi AX (xt8) Firmware | <3.0.0.4.386.45898 | |
ASUS ZenWiFi AX (xt8) | ||
All of | ||
ASUS RT-AX68U | <3.0.0.4.386.45911 | |
ASUS RT-AX68U Firmware | ||
ASUS ROG Rapture GT-AX11000 Firmware | <3.0.0.4.386.45898 | |
ASUS GT-AX11000 Firmware | ||
ASUS TUF Gaming AX3000 V2 Firmware | <3.0.0.4.386.45898 | |
ASUS routers | ||
ASUS RT-AX55 Firmware | <3.0.0.4.386.45898 | |
ASUS routers | ||
ASUS RT-AX56U V2 firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX56U firmware | ||
ASUS RT-AX56U V2 firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX56U V2 firmware | ||
ASUS RT-AX58U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX58U Firmware | ||
Asus RT-AX82U firmware | <3.0.0.4.386.45898 | |
Asus RT-AX82U firmware | ||
ASUS RT-AX82U GUNDAM EDITION | <3.0.0.4.386.45898 | |
ASUS RT-AX82U GUNDAM EDITION | ||
ASUS RT-AX86U ZAKU II EDITION firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX86 | ||
ASUS RT-AX86S | <3.0.0.4.386.45898 | |
ASUS RT-AX86S firmware | ||
ASUS RT-AX86U ZAKU II EDITION | <3.0.0.4.386.45898 | |
ASUS RT-AX86U ZAKU II EDITION firmware | ||
ASUS RT-AX88U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX88U Firmware | ||
ASUS RT-AX92U Firmware | <3.0.0.4.386.45898 | |
ASUS RT-AX92U Firmware | ||
ASUS TUF Gaming AX3000 | <3.0.0.4.386.45898 | |
ASUS TUF Gaming AX3000 firmware | ||
ASUS TUF Gaming AX5400 | <3.0.0.4.386.45898 | |
ASUS TUF-AX5400 firmware | ||
Asus XD6 Firmware | <3.0.0.4.386.45898 | |
ASUS ZenWiFi XD6 Firmware | ||
ASUS ZenWiFi AX (xt8) Firmware | <3.0.0.4.386.45898 | |
ASUS ZenWiFi AX (xt8) | ||
ASUS RT-AX68U | <3.0.0.4.386.45911 | |
ASUS RT-AX68U Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41436 is classified as a high severity vulnerability due to its potential to allow HTTP request smuggling in affected ASUS routers.
To fix CVE-2021-41436, update your affected ASUS router firmware to the latest version provided by ASUS.
CVE-2021-41436 affects multiple ASUS routers including the GT-AX11000, RT-AX3000, RT-AX55, and several others.
HTTP request smuggling is a technique that exploits discrepancies in the interpretation of HTTP requests between different servers or proxies, which is the issue exploited by CVE-2021-41436.
Symptoms of exploitation of CVE-2021-41436 may include unusual router behavior, unexpected logs, or unauthorized access attempts.