Saturday, April 13, 2024

All Versions of ASUS Routers Affected by Multiple Vulnerabilities that Allows to Gain Complete Router Access

Multiple critical vulnerabilities discovered in ASUS Routers that allow an attacker can able to gain complete control of the router access and this flaw existed in all the AsusWRT Routers.

There are 4 Vulnerabilities has been reported and all together will provide complete router access to attacker once router administrator login with his admin credentials then this flaw allows for retrieving the login/password using Administrator token.

According to seclists full disclosure, all the vulnerabilities are noticed to vendors and fixes has been realized.

Also Read Self-Destructive KillDisk Malware Overwrites then Deletes files and Force a Reboot

Highly Predictable Session Tokens (CVE-2017-15654)

This vulnerability allows an attacker can guess the administrator Login token in Router Which can be used to gain the admin user credentials when admin logged in the session.

stdlib rand function helps to generate a session token for an authenticated user and the Specific set of code initializes the random number generator each time a token is generated with router Login time.

Not Sufficient logged user IP validation(CVE-2017-15653)

Once attacker gain the session token using the Previous Vulnerability(CVE-2017-15653) attacker will perform the IP Verification mechanism and he will use special user-agent by sending the request.

Later Following Proof of Concept will be used for download current router configuration even if issued from a different than the logged user IP address

 curl "http://ROUTERADDRESS/s.CFG" -H "Cookie: asus_token=TOKEN" -H 'User-Agent:

Password Stored in Plain Text (CVE-2017-15656)

Asus routers stored all the passwords in the Plaintext in NVRAM memory which allow to downloading the backup and decode the password which leads to anyone can extract and see the admin password by Executing NVRAM (Show NVRAM).

Logged-in Information disclosure

Based on the all 3 major flaw Attack finally can able to retrieve the active session and exploit the router and gain the admin level access and the possible attacker can control the complete network that connected with compromised Router.

Heap buffer overflow – ASUS Routers

Along with above vulnerability Heap buffer overflow in multiple HTTP headers allows for an unauthenticated remote code execution for the routers not upgradable from

This vulnerability also have been fixed and assigned  CVE(CVE-2017-15655)

All these Vulnerabilities are notified to the specific vendor and they release a fixed version

But vendor REFUSED to fix the vulnerability as the routers using the vulnerable firmware are already EOL for Head Buffer Overflow.


Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles