Attacker Value
Unknown
0
CVE-2021-43702
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-43702
(Last updated October 07, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
ASUS RT-A88U 3.0.0.4.386_45898 is vulnerable to Cross Site Scripting (XSS). The ASUS router admin panel does not sanitize the WiFI logs correctly, if an attacker was able to change the SSID of the router with a custom payload, they could achieve stored XSS on the device.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
9.0 Critical
Impact Score:
6
Exploitability Score:
2.3
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
n/a
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- 4g-ac53u firmware 3.0.0.4.386.46061,
- 4g-ac68u firmware 3.0.0.4.386.46061,
- rog rapture gt-ac2900 firmware 3.0.0.4.386.46061,
- rog rapture gt-ac5300 firmware 3.0.0.4.386.46061,
- rog rapture gt-ax11000 firmware 3.0.0.4.386.46061,
- rt-ac1200 firmware 3.0.0.4.386.46061,
- rt-ac1200e firmware 3.0.0.4.386.46061,
- rt-ac1200g firmware 3.0.0.4.386.46061,
- rt-ac1200g+ firmware 3.0.0.4.386.46061,
- rt-ac1200gu firmware 3.0.0.4.386.46061,
- rt-ac1200hp firmware 3.0.0.4.386.46061,
- rt-ac1300g+ firmware 3.0.0.4.386.46061,
- rt-ac1300uhp firmware 3.0.0.4.386.46061,
- rt-ac1750 b1 firmware 3.0.0.4.386.46061,
- rt-ac1750 firmware 3.0.0.4.386.46061,
- rt-ac1900 firmware 3.0.0.4.386.46061,
- rt-ac1900p firmware 3.0.0.4.386.46061,
- rt-ac1900u firmware 3.0.0.4.386.46061,
- rt-ac2200 firmware 3.0.0.4.386.46061,
- rt-ac2400 firmware 3.0.0.4.386.46061,
- rt-ac2600 firmware 3.0.0.4.386.46061,
- rt-ac2900 firmware 3.0.0.4.386.46061,
- rt-ac3100 firmware 3.0.0.4.386.46061,
- rt-ac3200 firmware 3.0.0.4.386.46061,
- rt-ac51u firmware 3.0.0.4.386.46061,
- rt-ac51u+ firmware 3.0.0.4.386.46061,
- rt-ac52u b1 firmware 3.0.0.4.386.46061,
- rt-ac53 firmware 3.0.0.4.386.46061,
- rt-ac5300 firmware 3.0.0.4.386.46061,
- rt-ac55u firmware 3.0.0.4.386.46061,
- rt-ac55uhp firmware 3.0.0.4.386.46061,
- rt-ac56r firmware 3.0.0.4.386.46061,
- rt-ac56s firmware 3.0.0.4.386.46061,
- rt-ac56u firmware 3.0.0.4.386.46061,
- rt-ac57u firmware 3.0.0.4.386.46061,
- rt-ac58u firmware 3.0.0.4.386.46061,
- rt-ac65p firmware 3.0.0.4.386.46061,
- rt-ac65u firmware 3.0.0.4.386.46061,
- rt-ac66r firmware 3.0.0.4.386.46061,
- rt-ac66u b1 firmware 3.0.0.4.386.46061,
- rt-ac66u firmware 3.0.0.4.386.46061,
- rt-ac66u+ firmware 3.0.0.4.386.46061,
- rt-ac66w firmware 3.0.0.4.386.46061,
- rt-ac68p firmware 3.0.0.4.386.46061,
- rt-ac68r firmware 3.0.0.4.386.46061,
- rt-ac68u firmware 3.0.0.4.386.46061,
- rt-ac68uf firmware 3.0.0.4.386.46061,
- rt-ac68w firmware 3.0.0.4.386.46061,
- rt-ac85p firmware 3.0.0.4.386.46061,
- rt-ac85u firmware 3.0.0.4.386.46061,
- rt-ac86u firmware 3.0.0.4.386.46061,
- rt-ac87r firmware 3.0.0.4.386.46061,
- rt-ac87u firmware 3.0.0.4.386.46061,
- rt-ac88u firmware 3.0.0.4.386.46061,
- rt-acrh13 firmware 3.0.0.4.386.46061,
- rt-acrh17 firmware 3.0.0.4.386.46061,
- rt-ax3000 firmware 3.0.0.4.386.46061,
- rt-ax55 firmware 3.0.0.4.386.46061,
- rt-ax56u firmware 3.0.0.4.386.46061,
- rt-ax58u firmware 3.0.0.4.386.46061,
- rt-ax68u firmware 3.0.0.4.386.46061,
- rt-ax82u firmware 3.0.0.4.386.46061,
- rt-ax86u firmware 3.0.0.4.386.46061,
- rt-ax88u firmware 3.0.0.4.386.46061,
- rt-ax89x firmware 3.0.0.4.386.46061,
- rt-ax92u firmware 3.0.0.4.386.46061,
- rt-n12+ b1 firmware 3.0.0.4.386.46061,
- rt-n12d1 firmware 3.0.0.4.386.46061,
- rt-n12e b1 firmware 3.0.0.4.386.46061,
- rt-n12e c1 firmware 3.0.0.4.386.46061,
- rt-n12hp b1 firmware 3.0.0.4.386.46061,
- rt-n12vp b1 firmware 3.0.0.4.386.46061,
- rt-n14uhp firmware 3.0.0.4.386.46061,
- rt-n18u firmware 3.0.0.4.386.46061,
- rt-n19 firmware 3.0.0.4.386.46061,
- rt-n66c1 firmware 3.0.0.4.386.46061,
- rt-n66r firmware 3.0.0.4.386.46061,
- rt-n66u firmware 3.0.0.4.386.46061,
- rt-n66w firmware 3.0.0.4.386.46061,
- tuf gaming ax3000 v2 firmware 3.0.0.4.386.46061,
- tuf gaming ax5400 firmware 3.0.0.4.386.46061,
- zenwifi pro xt12 firmware 3.0.0.4.386.46061,
- zenwifi ac firmware 3.0.0.4.386.46061,
- zenwifi ac mini firmware 3.0.0.4.386.46061,
- zenwifi ax firmware 3.0.0.4.386.46061,
- zenwifi ax hybrid firmware 3.0.0.4.386.46061,
- zenwifi ax mini firmware 3.0.0.4.386.46061,
- zenwifi et8 firmware 3.0.0.4.386.46061,
- zenwifi pro et12 firmware 3.0.0.4.386.46061,
- zenwifi xd4s firmware 3.0.0.4.386.46061,
- zenwifi xd5 firmware 3.0.0.4.386.46061,
- zenwifi xd6 firmware 3.0.0.4.386.46061,
- zenwifi xt9 firmware 3.0.0.4.386.46061
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: