ASUS RT-AX3000 Firmware 3.0.0.4.388.22525

CPE Details

ASUS RT-AX3000 Firmware 3.0.0.4.388.22525
3.0.0.4.388.22525
2023-06-21
10h20 +00:00
2023-07-14
13h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:asus:rt-ax3000_firmware:3.0.0.4.388.22525:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

rt-ax3000_firmware

Version

3.0.0.4.388.22525

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-31195 2023-06-12 22h00 +00:00 ASUS Router RT-AX3000 Firmware versions prior to 3.0.0.4.388.23403 uses sensitive cookies without 'Secure' attribute. When an attacker is in a position to be able to mount a man-in-the-middle attack, and a user is tricked to log into the affected device through an unencrypted ('http') connection, the user's session may be hijacked.
5.3
Moyen
CVE-2021-3128 2021-04-12 15h41 +00:00 In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
7.5
Haute