ASUS RT-AC86U Firmware 3.0.0.4.386.51255

CPE Details

ASUS RT-AC86U Firmware 3.0.0.4.386.51255
3.0.0.4.386.51255
2023-06-08
13h51 +00:00
2023-08-15
11h39 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.51255:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

rt-ac86u_firmware

Version

3.0.0.4.386.51255

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-28702 2023-06-01 22h00 +00:00 ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands, disrupt system or terminate service.
8.8
High
CVE-2023-28703 2023-06-01 22h00 +00:00 ASUS RT-AC86U’s specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service.
7.2
High
CVE-2021-3128 2021-04-12 15h41 +00:00 In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
7.5
High