Unknown
CVE-2021-3128
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-3128
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP’s router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- rt-ac1750 b1 firmware,
- rt-ac1900 firmware,
- rt-ac1900p firmware,
- rt-ac1900u firmware,
- rt-ac2900 firmware,
- rt-ac3100 firmware,
- rt-ac5300 firmware,
- rt-ac58u firmware,
- rt-ac65u firmware,
- rt-ac66u b1 firmware,
- rt-ac68p firmware,
- rt-ac68r firmware,
- rt-ac68rw firmware,
- rt-ac68u firmware,
- rt-ac68w firmware,
- rt-ac85u firmware,
- rt-ac86u firmware,
- rt-ac88u firmware,
- rt-ax3000 firmware,
- rt-ax55 firmware,
- rt-ax56u firmware,
- rt-ax58u firmware,
- rt-ax68u firmware,
- rt-ax82u firmware,
- rt-ax86u firmware,
- rt-ax88u firmware,
- zenwifi ax (xt8) firmware
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: