ASUS resolved critical security flaw in several routers

ASUS resolved critical security flaw in several routers

Pierluigi Paganini

ASUS fixed critical remote authentication bypass bug in several routers

ASUS resolved critical security flaw in several routers

Pierluigi Paganini
June 16, 2024

The renowned ASUS organization resolved a critical security issue related to bypassing authentication remotely impacting several router models.

ASUS has fixed a critical remote authentication bypass vulnerability, identified as CVE-2024-3080 (CVSS v3.1 score: 9.8), which affected seven router models.

The vulnerability is related to an authentication bypass problem that can be exploited by a remote attacker to gain access to the device without proper authentication.

The impacted router models are:

  • ZenWiFi XT8 3.0.0.4.388_24609 (and older versions)
  • ZenWiFi Version RT-AX57 3.0.0.4.386_52294 (and older versions)
  • ZenWiFi Version RT-AC86U 3.0.0.4.386_51915 (and older versions)
  • ZenWiFi Version RT-AC68U 3.0.0.4.386_51668 (and older versions)

The company issued a firmware update to rectify the vulnerability as follows:

  • Upgrade ZenWiFi XT8 to 3.0.0.4.388_24621 (and newer versions)
  • Upgrade ZenWiFi XT8 V2 to 3.0.0.4.388_24621 (and newer versions)
  • Upgrade RT-AX88U to 3.0.0.4.388_24209 (and newer versions)
  • Upgrade RT-AX58U to 3.0 .0.4.388_24762 (and newer versions)
  • Upgrade RT-AX57 to 3.0.0.4.386_52303 (and newer versions)
  • Upgrade RT-AC86U to 3.0.0.4.386_51925 (and newer versions)
  • Upgrade RT-AC68U to 3.0.0.4.386_51685 (including newer versions)

The manufacturer also addressed a critical flaw allowing arbitrary firmware uploads, identified as CVE-2024-3912 (CVSS score 9.8) impacting various devices. An unauthenticated remote attacker could leverage this flaw to execute system commands on the vulnerable device.

The flaw was discovered by Carlos Köpke from PLASMALABS. Devices affected by this flaw include: DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-N14U, DSL-N14U_B1, DSL-N12U_C1, DSL-N12U_D1, DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL- AC55U, DSL-AC56U.

Some affected models will not receive firmware updates due to reaching end-of-life (EoL) status.

The following versions fix the flaw:

  • Upgrade the following models to 1.1.2.3_792 (and newer versions):
    DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U
  • Upgrade the following models to 1.1.2.3_807 (and newer versions):
    DSL-N12U_C1, DSL -N12U_D1, DSL-N14U, DSL-N14U_B1
  • Upgrade the following models to 1.1.2.3_999 (and newer versions):
    DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U
  • Models that are no longer supported should be replaced:
    DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55.
    If immediate replacement is not possible, it is recommended to disable remote access (Web access from WAN), virtual server (Port forwarding), DDNS, VPN server, DMZ, port trigger

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, routers)



About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.