ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| asus | gt-axe11000_firmware | 3.0.0.4.386.45898 | - |
| asus | rt-ax3000_firmware | 3.0.0.4.386.45898 | - |
| asus | rt-ax55_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
5
Affected Products
2
References
asus / gt-axe11000_firmware
| 3.0.0.4.386.45898 |
| - |
| asus | rt-ax58u_firmware | 3.0.0.4.386.45898 | - |
| asus | tuf-ax3000_firmware | 3.0.0.4.386.45898 | - |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Exploitability
Impact