ASUS Multiple Vulnerabilities
Release Date:
17 Jun 2024
5027
Views
RISK: Medium Risk
TYPE: Operating Systems - Networks OS
Multiple vulnerabilities were identified in ASUS Router. A remote attacker could exploit these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.
Impact
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- ZenWiFi XT8: versions prior to 3.0.0.4.388_24621
- ZenWiFi XT8 V2: versions prior to 3.0.0.4.388_24621
- RT-AX88U: versions prior to 3.0.0.4.388_24209
- RT-AX58U: versions prior to 3.0.0.4.388_24762
- RT-AX57: versions prior to 3.0.0.4.386_52303
- RT-AC86U: versions prior to 3.0.0.4.386_51925
- RT-AC68U: versions prior to 3.0.0.4.386_51685
- DSL-N17U
- DSL-N55U_C1
- DSL-N55U_D1
- DSL-N66U
- DSL-N12U_C1
- DSL-N12U_D1
- DSL-N14U
- DSL-N14U_B1
- DSL-N16
- DSL-AC51
- DSL-AC750
- DSL-AC52U
- DSL-AC55U
- DSL-AC56U
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- ZenWiFi XT8: 3.0.0.4.388_24621 or later version
- ZenWiFi XT8 V2: 3.0.0.4.388_24621 or later version
- RT-AX88U: 3.0.0.4.388_24209 or later version
- RT-AX58U: 3.0.0.4.388_24762 or later version
- RT-AX57: 3.0.0.4.386_52303 or later version
- RT-AC86U: 3.0.0.4.386_51925 or later version
- RT-AC68U: 3.0.0.4.386_51685 or later version
- DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U: 1.1.2.3_792 or later version
- DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1: 1.1.2.3_807 or later version
- DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U: 1.1.2.3_999 or later version
Vulnerability Identifier
Source
Related Link
Share with