CVE-2021-3128
12.04.2021, 19:15
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.Enginsight
Vendor | Product | Version |
---|---|---|
asus | zenwifi_ax_\(xt8\)_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | zenwifi_ax_\(xt8\)_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax3000_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax3000_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax55_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax55_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax56u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax56u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax58u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax58u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax68u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax68u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax82u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax82u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax86u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax86u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ax88u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ax88u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac66u_b1_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac66u_b1_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac1750_b1_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac1750_b1_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac1900_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac1900_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac1900p_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac1900p_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac1900u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac1900u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac2900_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac2900_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac3100_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac3100_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac5300_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac5300_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac58u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac58u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac65u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac65u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac68p_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac68p_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac68r_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac68r_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac68rw_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac68rw_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac68u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac68u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac68w_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac68w_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac85u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac85u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac86u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac86u_firmware | 𝑥 < 9.0.0.4.386.41994 |
asus | rt-ac88u_firmware | 𝑥 < 3.0.0.4.386.42095 |
asus | rt-ac88u_firmware | 𝑥 < 9.0.0.4.386.41994 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References