First published: Wed Mar 23 2022(Updated: )
Asus RT-AC68U <3.0.0.4.385.20633 and RT-AC5300 <3.0.0.4.384.82072 are affected by a buffer overflow in blocking_request.cgi.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-AC68U Firmware | <3.0.0.4.385.20633 | |
ASUS RT-AC68U | ||
Asus Rt-ac5300 Firmware | <3.0.0.4.384.82072 | |
Asus Rt-ac5300 | ||
All of | ||
ASUS RT-AC68U Firmware | <3.0.0.4.385.20633 | |
ASUS RT-AC68U | ||
All of | ||
Asus Rt-ac5300 Firmware | <3.0.0.4.384.82072 | |
Asus Rt-ac5300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45756 is a vulnerability affecting Asus RT-AC68U and RT-AC5300 routers, which allows for a buffer overflow in blocking_request.cgi.
CVE-2021-45756 has a severity rating of 9.8, which is considered critical.
Asus RT-AC68U firmware versions up to 3.0.0.4.385.20633 and Asus RT-AC5300 firmware versions up to 3.0.0.4.384.82072 are affected by CVE-2021-45756.
To fix CVE-2021-45756, it is recommended to update the firmware of the affected devices to a version beyond the vulnerable ones mentioned.
You can find more information about CVE-2021-45756 on the ASUS website, RT-AC68U website, and the GitHub repository related to this vulnerability.