Advisory

ASUS warns of critical vulnerability impacting seven router models

Take action: If you are using an ASUS router in your home or office network, check the list for vulnerable models. Then patch ASAP. If you can't patch, make sure you use strong passwords and block access to the admin panel via the internet, port forwarding, DDNS, VPN server, DMZ, and port trigger


Learn More

ASUS has issued a new firmware update to address a critical remote authentication bypass vulnerability affecting seven of its router models. The flaw, identified as CVE-2024-3080 (CVSS score 9.8). This vulnerability allows unauthenticated remote attackers to gain control over the affected devices.

Additionally, another vulnerability, CVE-2024-3079 (CVSS score: 7.2), a buffer overflow issue requiring admin account access to exploit, was also addressed.

The impacted router models are as follows:

  • XT8 (ZenWiFi AX XT8): Mesh WiFi 6 system offering tri-band coverage with speeds up to 6600 Mbps, AiMesh support, AiProtection Pro, seamless roaming, and parental controls.
  • XT8_V2 (ZenWiFi AX XT8 V2): An updated version of the XT8, featuring similar attributes with enhanced performance and stability.
  • RT-AX88U: Dual-band WiFi 6 router with speeds up to 6000 Mbps, 8 LAN ports, AiProtection Pro, and adaptive QoS for gaming and streaming.
  • RT-AX58U: Dual-band WiFi 6 router providing up to 3000 Mbps, with AiMesh support, AiProtection Pro, and MU-MIMO for efficient multi-device connectivity.
  • RT-AX57: Dual-band WiFi 6 router designed for basic needs, offering up to 3000 Mbps, with AiMesh support and basic parental controls.
  • RT-AC86U: Dual-band WiFi 5 router with speeds up to 2900 Mbps, featuring AiProtection, adaptive QoS, and game acceleration.
  • RT-AC68U: Dual-band WiFi 5 router offering up to 1900 Mbps, with AiMesh support, AiProtection, and robust parental controls.

ASUS recommends updating to the latest firmware versions, available on their download portals for each respective model. For users unable to perform immediate updates,

Mitigating measures to apply:

  • strong account and WiFi passwords,
  • disabling internet access to the admin panel,
  • turning off remote access to the admin panel from WAN, port forwarding, DDNS, VPN server, DMZ, and port triggering.

Taiwan's CERT has highlighted another critical vulnerability, CVE-2024-3912 (CVSS score: 9.8), which allows unauthenticated, remote attackers to execute system commands via arbitrary firmware upload. This flaw affects multiple ASUS router models. The suggested solution for models not reaching end-of-life (EoL) includes upgrading to specific firmware versions:

  • DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U: Upgrade to firmware version 1.1.2.3_792 or later.
  • DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1: Upgrade to firmware version 1.1.2.3_807 or later.
  • DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U: Upgrade to firmware version 1.1.2.3_999 or later.
  • DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55: EoL date reached, replacement is recommended.

ASUS has also updated the Download Master utility to version 3.1.0.114 to address several medium to high-severity issues including arbitrary file upload, OS command injection, buffer overflow, reflected XSS, and stored XSS vulnerabilities.

ASUS warns of critical vulnerability impacting seven router models