Critical ASUS Router Flaw Attacker Executes Arbitrary Commands

by Esmeralda McKenzie
Critical ASUS Router Flaw Attacker Executes Arbitrary Commands

Critical ASUS Router Flaw Attacker Executes Arbitrary Commands

Serious ASUS Router Flaw Attacker Executes Arbitrary Instructions

A serious vulnerability has been chanced on in plenty of models of ASUS routers. It permits unauthenticated distant attackers to complete arbitrary gadget commands on the affected devices.

The flaw, acknowledged as CVE-2024-3912, has been assigned a CVSS in discovering of 9.8, indicating its high severity.

EHA

CVE-2024-3912 – Vulnerability Valuable aspects

In step with the Twcert stories, Carlos Köpke from PLASMALABS reported the vulnerability, which is due to an arbitrary firmware upload vulnerability contemporary in varied ASUS router models.

By exploiting this flaw, attackers can remotely finish arbitrary commands on the compromised routers with out requiring any authentication.

Affected Devices

The following ASUS router models are suffering from this vulnerability:

  • DSL-N17U
  • DSL-N55U_C1
  • DSL-N55U_D1
  • DSL-N66U
  • DSL-N14U
  • DSL-N14U_B1
  • DSL-N12U_C1
  • DSL-N12U_D1
  • DSL-N16
  • DSL-AC51
  • DSL-AC750
  • DSL-AC52U
  • DSL-AC55U
  • DSL-AC56U

Mitigation and Recommendations

ASUS has released firmware updates to address this serious vulnerability.

Users are strongly suggested to interchange their affected routers to the following firmware versions:

  • For models DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, and DSL-N66U: Substitute to version 1.1.2.3_792 or later.
  • For models DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, and DSL-N14U_B1: Substitute to version 1.1.2.3_807 or later.
  • For models DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, and DSL-AC56U: Substitute to version 1.1.2.3_999 or later.

Several older models, including DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, DSL-N16P, DSL-N16U, DSL-AC52, and DSL-AC55, are now now no longer maintained.

Users of these models are suggested to interchange their routers.

If replacement is now no longer feasible in the fast interval of time, it’s miles suggested that distant gain entry to (Web gain entry to from WAN), digital server (Port forwarding), DDNS, VPN server, DMZ, and port residence off capabilities be disabled to mitigate the likelihood of exploitation.

The invention of this serious vulnerability in ASUS routers highlights the importance of normally updating the router firmware and replacing finish-of-lifestyles devices.

Users are suggested to dangle rapid motion to present protection to their networks from capacity attacks by making expend of the needed firmware updates or replacing affected routers.

ASUS has proactively addressed this drawback and supplied timely fixes to guarantee the safety of its clients.

Source credit : cybersecuritynews.com

Related Posts