Friday, April 4, 2025
HomeCVE/vulnerabilityASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

Published on

SIEM as a Service

Follow Us on Google News

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several of its router models. 

These flaws, tracked as CVE-2024-12912 and CVE-2024-13062, pose severe risks by allowing attackers to execute arbitrary commands on compromised devices. ASUS has advised users to act immediately by updating their routers to stay protected.

About the Vulnerabilities

The two vulnerabilities are linked to the router firmware’s AiCloud feature. According to ASUS, these “injection and execution vulnerabilities” can allow authenticated attackers to trigger remote command execution.

Both flaws have been assigned a CVSS (Common Vulnerability Scoring System) score of 7.2, categorizing them as high severity.

CVE Details:

  1. CVE-2024-12912: This vulnerability exploits a lack of validation in the AiCloud service, enabling attackers to execute arbitrary commands.
  2. CVE-2024-13062: This allows a similarly dangerous attack vector through improperly sanitized input.

Users of vulnerable ASUS router models are at risk if these flaws are left unpatched.

To address these vulnerabilities, ASUS has urged users to quickly update their router firmware. The latest versions—3.0.0.4_386, 3.0.0.4_388, or 3.0.0.6_102 series—contain fixes that mitigate the risks.

For users who cannot immediately apply the updates, ASUS recommends the following mitigation practices:

  • Use Strong Passwords: Set unique, complex passwords for both your wireless network and router administration page. Passwords should include at least 10 characters with a mix of numbers, symbols, and uppercase/lowercase letters.
  • Enable AiCloud Password Protection: Ensure password protection is enabled within the AiCloud service to prevent unauthorized access.
  • Disable External Services: Turn off internet-facing features like remote access, port forwarding, DDNS, VPN server, DMZ, and FTP when not in use.

This advisory emphasizes the critical importance of regularly updating router firmware and following strong security practices.

ASUS advises customers to frequently check their device settings and ensure all features are configured securely. The company encourages users to report any product-related security concerns through its dedicated vulnerability disclosure page.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...