Skip to main content

ASUS Multiple Vulnerabilities

Release Date: 17 Jun 2024 5027 Views

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

TYPE: Networks OS

Multiple vulnerabilities were identified in ASUS Router. A remote attacker could exploit these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.


Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • ZenWiFi XT8: versions prior to 3.0.0.4.388_24621
  • ZenWiFi XT8 V2: versions prior to 3.0.0.4.388_24621
  • RT-AX88U: versions prior to 3.0.0.4.388_24209
  • RT-AX58U: versions prior to 3.0.0.4.388_24762
  • RT-AX57: versions prior to 3.0.0.4.386_52303
  • RT-AC86U: versions prior to 3.0.0.4.386_51925
  • RT-AC68U: versions prior to 3.0.0.4.386_51685
  • DSL-N17U
  • DSL-N55U_C1
  • DSL-N55U_D1
  • DSL-N66U
  • DSL-N12U_C1
  • DSL-N12U_D1
  • DSL-N14U
  • DSL-N14U_B1
  • DSL-N16
  • DSL-AC51
  • DSL-AC750
  • DSL-AC52U
  • DSL-AC55U
  • DSL-AC56U

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • ZenWiFi XT8: 3.0.0.4.388_24621 or later version
  • ZenWiFi XT8 V2: 3.0.0.4.388_24621 or later version
  • RT-AX88U: 3.0.0.4.388_24209 or later version
  • RT-AX58U: 3.0.0.4.388_24762 or later version
  • RT-AX57: 3.0.0.4.386_52303 or later version
  • RT-AC86U: 3.0.0.4.386_51925 or later version
  • RT-AC68U: 3.0.0.4.386_51685 or later version
  • DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U: 1.1.2.3_792 or later version
  • DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1: 1.1.2.3_807 or later version
  • DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U: 1.1.2.3_999 or later version

Vulnerability Identifier


Source


Related Link