ASUS RT-AC86U FIRMWARE 3.0.0.4.386.45956

CPE Details

ASUS RT-AC86U FIRMWARE 3.0.0.4.386.45956
3.0.0.4.386.45956
2022-04-13
14h53 +00:00
2022-05-02
12h57 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.45956:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

rt-ac86u_firmware

Version

3.0.0.4.386.45956

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-25597 2022-04-07 18h22 +00:00 ASUS RT-AC86U’s LPD service has insufficient filtering for special characters in the user request, which allows an unauthenticated LAN attacker to perform command injection attack, execute arbitrary commands and disrupt or terminate service.
8.8
Haute
CVE-2022-25596 2022-04-07 18h22 +00:00 ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
8.8
Haute
CVE-2022-25595 2022-04-07 18h22 +00:00 ASUS RT-AC86U has improper user request handling, which allows an unauthenticated LAN attacker to cause a denial of service by sending particular request a server-to-client reply attempt.
6.5
Moyen
CVE-2021-3128 2021-04-12 15h41 +00:00 In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
7.5
Haute