In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
References
Link Resource
https://www.asus.com/Networking-IoT-Servers/Whole-Home-Mesh-WiFi-System/ZenWiFi-WiFi-Systems/ASUS-ZenWiFi-AX-XT8-/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX3000/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX55/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX56U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX58U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX68U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX82U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX86U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-6/All-series/RT-AX88U/HelpDesk_BIOS/ Product Vendor Advisory
https://www.asus.com/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AC66U-B1/HelpDesk_Download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC1750_B1/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC1900/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC1900P/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC1900U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC2900/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC3100/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC5300/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC58U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC65U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC68P/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC68R/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC68RW/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC68U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC68W/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC85U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC86U/HelpDesk_download/ Product Vendor Advisory
https://www.asus.com/supportonly/RT-AC88U/HelpDesk_download/ Product Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-04-12T17:41:07

Updated: 2021-04-12T17:41:07

Reserved: 2021-01-12T00:00:00


Link: CVE-2021-3128

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-04-12T19:15:14.830

Modified: 2021-04-20T21:50:11.817


Link: CVE-2021-3128

JSON object: View

cve-icon Redhat Information

No data.

CWE