The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
References
| Link | Resource |
|---|---|
| https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md | Broken Link Exploit Third Party Advisory |
| https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ | Product |
| https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ | Product |
| https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass | Exploit |
| https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md | Broken Link Exploit Third Party Advisory |
| https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ | Product |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-32030 | US Government Resource |
Configurations
History
No history.
Information
Published : 2021-05-06 15:15
Updated : 2025-11-10 14:41
NVD link : CVE-2021-32030
Mitre link : CVE-2021-32030
CVE.ORG link : CVE-2021-32030
JSON object : View
Products Affected
asus
- gt-ac2900_firmware
- lyra_mini_firmware
- gt-ac2900
- lyra_mini
CWE
CWE-287
Improper Authentication
