A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) prior to 3.0.0.4.386.45898, and RT-AX68U prior to 3.0.0.4.386.45911, allows a remote malicious user to attempt any number of login attempts via sending a specific HTTP request.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
asus gt-ax11000_firmware |
||
asus rt-ax3000_firmware |
||
asus rt-ax55_firmware |
||
asus rt-ax56u_firmware |
||
asus rt-ax56u_v2_firmware |
||
asus rt-ax58u_firmware |
||
asus rt-ax82u_firmware |
||
asus rt-ax82u_gundam_edition_firmware |
||
asus rt-ax86u_firmware |
||
asus rt-ax86s_firmware |
||
asus rt-ax86u_zaku_ii_edition_firmware |
||
asus rt-ax88u_firmware |
||
asus rt-ax92u_firmware |
||
asus tuf_gaming_ax3000_firmware |
||
asus tuf-ax5400_firmware |
||
asus zenwifi_xd6_firmware |
||
asus zenwifi_ax_\\(xt8\\)_firmware |
||
asus rt-ax68u_firmware |