First published: Mon Jan 03 2022(Updated: )
ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.
Credit: twcert@cert.org.tw twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax56u Firmware | =3.0.0.4.386.44266 | |
ASUS RT-AX56U | ||
All of | ||
Asus Rt-ax56u Firmware | =3.0.0.4.386.44266 | |
ASUS RT-AX56U |
ASUS RT-AX56U firmware update version to 3.0.0.4.386.45898
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the ASUS RT-AX56U Wi-Fi Router vulnerability is CVE-2021-44158.
The severity of CVE-2021-44158 is high, with a severity value of 8.
The affected software version of CVE-2021-44158 is ASUS RT-AX56U Firmware 3.0.0.4.386.44266.
CVE-2021-44158 poses a risk of arbitrary code execution, allowing an attacker to control the system or disrupt services.
No, ASUS RT-AX56U is not vulnerable to CVE-2021-44158.