First published: Tue Jan 10 2023(Updated: )
An authentication bypass vulnerability exists in the get_IFTTTTtoken.cgi functionality of Asus RT-AX82U 3.0.0.4.386_49674-ge182230. A specially-crafted HTTP request can lead to full administrative access to the device. An attacker would need to send a series of HTTP requests to exploit this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Asus Rt-ax82u Firmware | =3.0.0.4.386_49674-ge182230 | |
Asus RT-AX82U |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35401 is an authentication bypass vulnerability in the get_IFTTTTtoken.cgi functionality of Asus RT-AX82U firmware version 3.0.0.4.386_49674-ge182230.
CVE-2022-35401 has a severity rating of 8.1, which is considered critical.
CVE-2022-35401 allows an attacker to bypass authentication and gain full administrative access to the Asus RT-AX82U device by sending a specially-crafted HTTP request.
Asus RT-AX82U firmware version 3.0.0.4.386_49674-ge182230 is affected by CVE-2022-35401.
No, the Asus RT-AX82U hardware itself is not vulnerable to CVE-2022-35401.
To fix CVE-2022-35401, users should update their Asus RT-AX82U firmware to a version that is not affected by the vulnerability.