ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy.
These flaws highlight the continuous challenges in securing IoT and networking devices against increasingly sophisticated cyber threats.
The most pressing concern involves a series of remote code execution (RCE) vulnerabilities in ASUS routers.
These vulnerabilities allow attackers to gain unauthorized access and control over affected devices by exploiting improper input validation, authentication bypass, and other security weaknesses.
Successful exploitation of these flaws could enable attackers to:
ASUS has actively responded by releasing firmware updates and encourages users to apply these patches immediately to mitigate risks.
ASUS has publicly disclosed numerous Common Vulnerabilities and Exposures (CVEs) related to these router flaws.
Below is a table summarizing key CVEs along with affected products to assist users and network administrators in identifying vulnerable devices and prioritizing security updates:
CVE Identifier | Description | Affected ASUS Router Models | Disclosure Date |
CVE-2024-3912 | Remote Code Execution via improper input validation | DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1, DSL-N16, DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U | 2024-01-22 |
CVE-2024-3079 | Authentication bypass in router web interface | XT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U | 2024-06-14 |
CVE-2024-3080 | Command injection vulnerability | XT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U | 2024-06-14 |
CVE-2024-0401 | Security bypass allowing elevated privileges | XT8, XT8_V2, RT-AX88U, RT-AX86U, RT-AX58U, RT-AX57, RT-AX55, RT-AC86U, RT-AC68U | 2024-05-29 |
CVE-2023-41345 to CVE-2023-41348 | Multiple RCE and privilege escalation flaws | RT-AX55 | 2023-11-03 |
ASUS has a dedicated security advisory portal (https://www.asus.com/securityadvisory/) where users can report vulnerabilities and download firmware updates.
The company emphasizes responsible reporting and confidentiality of security issues during investigation.
ASUS continues to prioritize security through prompt updates and communication with its user community.
The company also provides detailed lists of affected products along with fixed issues for transparency and user awareness.
The recent wave of ASUS router vulnerabilities underscores the importance of timely patching and proactive network security practices.
With critical CVEs allowing remote code execution already public, users must act swiftly to update their devices and protect their home or enterprise networks from potential cyberattacks.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules,…
Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative…
A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files…
A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research.…
Microsoft’s Copilot for SharePoint, designed to streamline enterprise collaboration through generative AI, has become an…
Cybersecurity developers have released a new tool called "defendnot," a successor to the previously DMCA-takedown-affected…