ASUS RT-AC2900 Router Firmware 3.0.0.4.384.20648

CPE Details

ASUS RT-AC2900 Router Firmware 3.0.0.4.384.20648
3.0.0.4.384.20648
2018-05-23
15h10 +00:00
2021-05-18
12h40 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:asus:rt-ac2900_firmware:3.0.0.4.384.20648:*:*:*:*:*:*:*

Informations

Vendor

asus

Product

rt-ac2900_firmware

Version

3.0.0.4.384.20648

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-3128 2021-04-12 15h41 +00:00 In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
7.5
Haute
CVE-2018-8826 2018-04-20 18h00 +00:00 ASUS RT-AC51U, RT-AC58U, RT-AC66U, RT-AC1750, RT-ACRH13, and RT-N12 D1 routers with firmware before 3.0.0.4.380.8228; RT-AC52U B1, RT-AC1200 and RT-N600 routers with firmware before 3.0.0.4.380.10446; RT-AC55U and RT-AC55UHP routers with firmware before 3.0.0.4.382.50276; RT-AC86U and RT-AC2900 routers with firmware before 3.0.0.4.384.20648; and possibly other RT-series routers allow remote attackers to execute arbitrary code via unspecified vectors.
9.8
Critique