CVE-2021-32030
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 05, 2021
- Published Date
- May 06, 2021
- Last Updated
- February 06, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CVSS Scores
EPSS Score
- Score
- 93.48% (Percentile: 99.81%) as of 2025-04-29
Exploit Status
- Exploited in the Wild
- Yes (added 2025-04-23 00:00:00 UTC) Source
References
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md
https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass
https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-04-28 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-32030.yaml | 2025-04-26 00:00:00 UTC |