CVE-2021-32030
Summary
| CVE | CVE-2021-32030 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-06 15:15:00 UTC |
| Updated | 2021-05-13 20:12:00 UTC |
| Description | The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. |
Risk And Classification
EPSS: 0.942150000 probability, percentile 0.999230000 (date 2026-04-01)
CISA KEV: Listed on 2025-06-02; due 2025-06-23; ransomware use Unknown
Problem Types: CWE-287
CISA Known Exploited Vulnerability
| Vendor | ASUS |
|---|---|
| Product | Routers |
| Name | ASUS Routers Improper Authentication Vulnerability |
| Required Action | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| Notes | https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ ; https://www.asus.com/us/supportonly/rog%20rapture%20gt-ac2900/helpdesk_bios/; https://nvd.nist.gov/vuln/detail/CVE-2021-32030 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Asus | Gt-ac2900 | - | All | All | All |
| Operating System | Asus | Gt-ac2900 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| advisories/ATREDIS-2020-0010.md at master · atredispartners/advisories · GitHub | MISC | github.com | |
| RT-AC2900|WiFi Routers|ASUS Global | MISC | www.asus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.