Lucene search

K
AsusRt-ax88u Firmware

12 matches found

CVE
CVE
added 2022/07/05 12:15 p.m.114 views

CVE-2021-43702

ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.

9CVSS8.5AI score0.0052EPSS
CVE
CVE
added 2021/11/19 12:15 p.m.90 views

CVE-2021-41435

A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX...

10CVSS9.2AI score0.04917EPSS
CVE
CVE
added 2022/04/22 7:15 a.m.80 views

CVE-2022-26674

ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service.

9.8CVSS9.8AI score0.04547EPSS
CVE
CVE
added 2021/11/19 12:15 p.m.67 views

CVE-2021-41436

An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), AS...

7.8CVSS7.5AI score0.05341EPSS
CVE
CVE
added 2022/04/22 7:15 a.m.66 views

CVE-2022-26673

ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.

5.4CVSS5.3AI score0.0021EPSS
CVE
CVE
added 2022/09/26 2:15 p.m.62 views

CVE-2021-41437

An HTTP response splitting attack in web application in ASUS RT-AX88U before v3.0.0.4.388.20558 allows an attacker to craft a specific URL that if an authenticated victim visits it, the URL will give access to the cloud storage of the attacker.

6.5CVSS6.3AI score0.0096EPSS
CVE
CVE
added 2021/04/12 7:15 p.m.59 views

CVE-2021-3128

In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or

7.5CVSS7.3AI score0.0248EPSS
CVE
CVE
added 2024/06/24 2:15 p.m.46 views

CVE-2024-33278

Buffer Overflow vulnerability in ASUS router RT-AX88U with firmware versions v3.0.0.4.388_24198 allows a remote attacker to execute arbitrary code via the connection_state_machine due to improper length validation for the cookie field.

9.8CVSS8.1AI score0.00947EPSS
CVE
CVE
added 2023/09/18 3:15 a.m.37 views

CVE-2023-41349

ASUS router RT-AX88U has a vulnerability of using externally controllable format strings within its Advanced Open VPN function. An authenticated remote attacker can exploit the exported OpenVPN configuration to execute an externally-controlled format string attack, resulting in sensitivity informat...

8.8CVSS8.6AI score0.00311EPSS
CVE
CVE
added 2023/07/31 6:15 a.m.35 views

CVE-2023-34360

A stored cross-site scripting (XSS) issue was discovered within the Custom User Icons functionality of ASUS RT-AX88U running firmware versions 3.0.0.4.388.23110 and prior. After a remote attacker logging in device with regular user privilege, the remote attacker can perform a Stored Cross-site Scri...

8.2CVSS5.5AI score0.0004EPSS
CVE
CVE
added 2023/07/31 5:15 a.m.28 views

CVE-2023-34358

ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to a device which contains a specific user agent, causing the httpd binary to crash during a string comparison performed within web.c, resulting in a DoS condition.

7.5CVSS7.5AI score0.00268EPSS
CVE
CVE
added 2023/07/31 5:15 a.m.28 views

CVE-2023-34359

ASUS RT-AX88U's httpd is subject to an unauthenticated DoS condition. A remote attacker can send a specially crafted request to the device which causes the httpd binary to crash within the "do_json_decode()" function of ej.c, resulting in a DoS condition.

7.5CVSS7.6AI score0.00265EPSS