Product:

Rt\-Ax55_firmware

(Asus)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2023-09-07 CVE-2023-39238 It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_svr.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware 7.2
2023-09-07 CVE-2023-39239 It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware 7.2
2023-09-07 CVE-2023-39240 It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. Rt\-Ac86u_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_v2_firmware 7.2
2023-11-03 CVE-2023-41345 ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services. Rt\-Ax55_firmware 8.8
2023-11-03 CVE-2023-41346 ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services. Rt\-Ax55_firmware 8.8
2023-11-03 CVE-2023-41347 ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services. Rt\-Ax55_firmware 8.8
2023-11-03 CVE-2023-41348 ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services. Rt\-Ax55_firmware 8.8
2023-09-11 CVE-2023-39780 ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability. Rt\-Ax55_firmware 8.8
2022-08-05 CVE-2022-26376 A memory corruption vulnerability exists in the httpd unescape functionality of Asuswrt prior to 3.0.0.4.386_48706 and Asuswrt-Merlin New Gen prior to 386.7.. A specially-crafted HTTP request can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. Asuswrt, Et12_firmware, Gt\-Ax11000_firmware, Gt\-Ax11000_pro_firmware, Gt\-Ax6000_firmware, Gt\-Axe16000_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_firmware, Rt\-Ax58u_firmware, Rt\-Ax68u_firmware, Rt\-Ax82u_firmware, Rt\-Ax86u_firmware, Tuf\-Ax3000_v2_firmware, Xd4_firmware, Xd6_firmware, Xt12_firmware, Xt8_firmware, Xt9_firmware, New_gen 9.8
2022-07-05 CVE-2021-43702 ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device. 4g\-Ac53u_firmware, 4g\-Ac68u_firmware, Rog_rapture_gt\-Ac2900_firmware, Rog_rapture_gt\-Ac5300_firmware, Rog_rapture_gt\-Ax11000_firmware, Rt\-Ac1200_firmware, Rt\-Ac1200e_firmware, Rt\-Ac1200g\+_firmware, Rt\-Ac1200g_firmware, Rt\-Ac1200gu_firmware, Rt\-Ac1200hp_firmware, Rt\-Ac1300g\+_firmware, Rt\-Ac1300uhp_firmware, Rt\-Ac1750_b1__firmware, Rt\-Ac1750_firmware, Rt\-Ac1900_firmware, Rt\-Ac1900p_firmware, Rt\-Ac1900u_firmware, Rt\-Ac2200_firmware, Rt\-Ac2400_firmware, Rt\-Ac2600_firmware, Rt\-Ac2900_firmware, Rt\-Ac3100_firmware, Rt\-Ac3200_firmware, Rt\-Ac51u\+_firmware, Rt\-Ac51u_firmware, Rt\-Ac52u_b1_firmware, Rt\-Ac5300_firmware, Rt\-Ac53_firmware, Rt\-Ac55u_firmware, Rt\-Ac55uhp_firmware, Rt\-Ac56r_firmware, Rt\-Ac56s_firmware, Rt\-Ac56u_firmware, Rt\-Ac57u_firmware, Rt\-Ac58u_firmware, Rt\-Ac65p_firmware, Rt\-Ac65u_firmware, Rt\-Ac66r_firmware, Rt\-Ac66u\+_firmware, Rt\-Ac66u_b1_firmware, Rt\-Ac66u_firmware, Rt\-Ac66w_firmware, Rt\-Ac68p_firmware, Rt\-Ac68r_firmware, Rt\-Ac68u_firmware, Rt\-Ac68uf_firmware, Rt\-Ac68w_firmware, Rt\-Ac85p_firmware, Rt\-Ac85u_firmware, Rt\-Ac86u_firmware, Rt\-Ac87r_firmware, Rt\-Ac87u_firmware, Rt\-Ac88u_firmware, Rt\-Acrh13_firmware, Rt\-Acrh17_firmware, Rt\-Ax3000_firmware, Rt\-Ax55_firmware, Rt\-Ax56u_firmware, Rt\-Ax58u_firmware, Rt\-Ax68u_firmware, Rt\-Ax82u_firmware, Rt\-Ax86u_firmware, Rt\-Ax88u_firmware, Rt\-Ax89x_firmware, Rt\-Ax92u_firmware, Rt\-N12\+_b1_firmware, Rt\-N12d1_firmware, Rt\-N12e_b1_firmware, Rt\-N12e_c1_firmware, Rt\-N12hp_b1_firmware, Rt\-N12vp_b1_firmware, Rt\-N14uhp_firmware, Rt\-N18u_firmware, Rt\-N19_firmware, Rt\-N66c1_firmware, Rt\-N66r_firmware, Rt\-N66u_firmware, Rt\-N66w_firmware, Tuf_gaming_ax3000_v2_firmware, Tuf_gaming_ax5400_firmware, Zenwifi__pro_xt12_firmware, Zenwifi_ac_firmware, Zenwifi_ac_mini_firmware, Zenwifi_ax_firmware, Zenwifi_ax_hybrid_firmware, Zenwifi_ax_mini_firmware, Zenwifi_et8_firmware, Zenwifi_pro_et12_firmware, Zenwifi_xd4s_firmware, Zenwifi_xd5_firmware, Zenwifi_xd6_firmware, Zenwifi_xt9_firmware 9.0