ASUS resolved critical security flaw in several routers

The renowned ASUS organization resolved a critical security issue related to bypassing authentication remotely impacting several router models.
ASUS has fixed a critical remote authentication bypass vulnerability, identified as CVE-2024-3080 (CVSS v3.1 score: 9.8), which affected seven router models.
The vulnerability is related to an authentication bypass problem that can be exploited by a remote attacker to gain access to the device without proper authentication.
The impacted router models are:
- ZenWiFi XT8 3.0.0.4.388_24609 (and older versions)
- ZenWiFi Version RT-AX57 3.0.0.4.386_52294 (and older versions)
- ZenWiFi Version RT-AC86U 3.0.0.4.386_51915 (and older versions)
- ZenWiFi Version RT-AC68U 3.0.0.4.386_51668 (and older versions)
The company issued a firmware update to rectify the vulnerability as follows:
- Upgrade ZenWiFi XT8 to 3.0.0.4.388_24621 (and newer versions)
- Upgrade ZenWiFi XT8 V2 to 3.0.0.4.388_24621 (and newer versions)
- Upgrade RT-AX88U to 3.0.0.4.388_24209 (and newer versions)
- Upgrade RT-AX58U to 3.0 .0.4.388_24762 (and newer versions)
- Upgrade RT-AX57 to 3.0.0.4.386_52303 (and newer versions)
- Upgrade RT-AC86U to 3.0.0.4.386_51925 (and newer versions)
- Upgrade RT-AC68U to 3.0.0.4.386_51685 (including newer versions)
The manufacturer also addressed a critical flaw allowing arbitrary firmware uploads, identified as CVE-2024-3912 (CVSS score 9.8) impacting various devices. An unauthenticated remote attacker could leverage this flaw to execute system commands on the vulnerable device.
The flaw was discovered by Carlos Köpke from PLASMALABS. Devices affected by this flaw include: DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-N14U, DSL-N14U_B1, DSL-N12U_C1, DSL-N12U_D1, DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL- AC55U, DSL-AC56U.
Some affected models will not receive firmware updates due to reaching end-of-life (EoL) status.
The following versions fix the flaw:
- Upgrade the following models to 1.1.2.3_792 (and newer versions):
DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U - Upgrade the following models to 1.1.2.3_807 (and newer versions):
DSL-N12U_C1, DSL -N12U_D1, DSL-N14U, DSL-N14U_B1 - Upgrade the following models to 1.1.2.3_999 (and newer versions):
DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U - Models that are no longer supported should be replaced:
DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55.
If immediate replacement is not possible, it is recommended to disable remote access (Web access from WAN), virtual server (Port forwarding), DDNS, VPN server, DMZ, port trigger
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, routers)
