The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
References
Configurations
History
03 Jun 2025, 21:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:asus:lyra_mini:-:*:*:*:*:*:*:* cpe:2.3:o:asus:lyra_mini_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Asus lyra Mini
Asus lyra Mini Firmware |
|
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md - Exploit, Third Party Advisory | |
References | () https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ - Product | |
References | () https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ - Product | |
References | () https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass - Exploit |
06 Feb 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN. |
24 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md - Third Party Advisory | |
References | () https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-Gaming-Routers/RT-AC2900/HelpDesk_BIOS/ - Product, Vendor Advisory |
Information
Published : 2021-05-06 15:15
Updated : 2025-06-03 21:02
NVD link : CVE-2021-32030
Mitre link : CVE-2021-32030
CVE.ORG link : CVE-2021-32030
JSON object : View
Products Affected
asus
- gt-ac2900
- lyra_mini_firmware
- gt-ac2900_firmware
- lyra_mini
CWE
CWE-287
Improper Authentication