CVE-2021-41435
19.11.2021, 12:15
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request.Enginsight
Vendor | Product | Version |
---|---|---|
asus | gt-ax11000_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax3000_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax55_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax56u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax56u_v2_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax58u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax82u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax82u_gundam_edition_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax82u_gundam_edition_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax86u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax86s_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax86u_zaku_ii_edition_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax88u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax92u_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | tuf_gaming_ax3000_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | tuf-ax5400_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | zenwifi_xd6_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | zenwifi_ax_\(xt8\)_firmware | 𝑥 < 3.0.0.4.386.45898 |
asus | rt-ax68u_firmware | 𝑥 < 3.0.0.4.386.45911 |
𝑥
= Vulnerable software versions
References