CVE-2021-40556
Summary
| CVE | CVE-2021-40556 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-10-06 18:15:00 UTC |
| Updated | 2022-10-07 17:39:00 UTC |
| Description | A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266. This vulnerability is caused by the strcat function called by "caupload" input handle function allowing the user to enter 0xFFFF bytes into the stack. This vulnerability allows an attacker to execute commands remotely. The vulnerability requires authentication. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Asus | Rt-ax56u | - | All | All | All |
| Operating System | Asus | Rt-ax56u Firmware | 3.0.0.4.386.44266 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| RT-AX56U|無線路由器|ASUS 台灣 | CONFIRM | www.asus.com | |
| ASUS栈溢出漏洞分析 - X1ng's Blog | MISC | x1ng.top | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.