Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rt\-Ax56u_firmware
(Asus)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 12 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-08-05 | CVE-2022-26376 | A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. | Asuswrt, Et12_firmware, Gt\-Ax11000_firmware, Gt\-Ax11000_pro_firmware, Gt\-Ax6000_firmware, Gt\-Axe16000_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_firmware, Rt\-Ax58u_firmware, Rt\-Ax68u_firmware, Rt\-Ax82u_firmware, Rt\-Ax86u_firmware, Tuf\-Ax3000_v2_firmware, Xd4_firmware, Xd6_firmware, Xt12_firmware, Xt8_firmware, Xt9_firmware, New_gen | 9.8 | ||
2022-10-06 | CVE-2021-40556 | A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266. This vulnerability is caused by the strcat function called by "caupload" input handle function allowing the user to enter 0xFFFF bytes into the stack. This vulnerability allows an attacker to execute commands remotely. The vulnerability requires authentication. | Rt\-Ax56u_firmware | 8.8 |