In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| asus | zenwifi_ax_\(xt8\)_firmware | 3.0.0.4.386.42095 | - |
| asus | zenwifi_ax_\(xt8\)_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax3000_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
54
Affected Products
54
References
asus / zenwifi_ax_\(xt8\)_firmware
| 3.0.0.4.386.42095 |
| - |
| asus | rt-ax3000_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax55_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax55_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax56u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax56u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax58u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax58u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax68u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax68u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax82u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax82u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax86u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax86u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ax88u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ax88u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac66u_b1_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac66u_b1_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac1750_b1_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac1750_b1_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac1900_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac1900_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac1900p_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac1900p_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac1900u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac1900u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac2900_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac2900_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac3100_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac3100_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac5300_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac5300_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac58u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac58u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac65u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac65u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac68p_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac68p_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac68r_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac68r_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac68rw_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac68rw_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac68u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac68u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac68w_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac68w_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac85u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac85u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac86u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac86u_firmware | 9.0.0.4.386.41994 | - |
| asus | rt-ac88u_firmware | 3.0.0.4.386.42095 | - |
| asus | rt-ac88u_firmware | 9.0.0.4.386.41994 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact