Advertisement

News

These Asus routers need to be updated due to a critical vulnerability

These Asus routers need to be updated due to a critical vulnerability
Onur Demirkol

Onur Demirkol

  • Updated:

According to recent news, a couple of Asus router users are at high risk as these devices carry important vulnerabilities

Several Asus routers have been identified as having critical vulnerabilities, with a Common Vulnerability Scoring System (CVSS) score of 9.8 for some. In contrast, others are rated as “high” severity with CVSS scores of 8.8.

Three remote code execution flaws with critical severity have been found in the ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U routers. If security upgrades are not installed, these flaws might possibly provide threat actors access to the devices.

These routers are well-liked high-end devices that customers with high-performance requirements and gamers alike use. The vulnerabilities are linked to format string vulnerabilities and have a CVSS v3.1 score of 9.8 out of 10.0. These weaknesses can be exploited remotely and anonymously, allowing for arbitrary device actions, service interruptions, and remote code execution.

Asus router models that are at risk

According to Bleeping Computer, the three vulnerabilities that were disclosed earlier today are:

  • CVE-2023-39238: Lack of proper verification of the input format string on the iperf-related API module ‘ser_iperf3_svr.cgi’.
  • CVE-2023-39239: Lack of proper verification of the input format string in the API of the general setting function.
  • CVE-2023-39240: Lack of proper verification of the input format string on the iperf-related API module ‘ser_iperf3_cli.cgi’.

“The above issues impact ASUS RT-AX55, RT-AX56U_V2, and RT-AC86U in firmware versions 3.0.0.4.386_50460, 3.0.0.4.386_50460, and 3.0.0.4_386_51529 respectively,” BC added.

The Taiwan Computer Emergency Response Team/Coordination Center (TWCERT/CC) has disclosed eight vulnerabilities in these Asus routers. If successfully exploited, these vulnerabilities can allow attackers to carry out actions like command injection and remote code execution (RCE).

When user input inside the format string parameters of specific functions is not adequately verified or sanitized, format string vulnerabilities might arise. They may result in information leakage and code execution, among other security problems. In order to take advantage of these flaws, attackers usually send specially designed input to the susceptible devices, focusing on certain administrative API operations in the case of the ASUS routers.

How to protect yourself against hackers

The only thing you need to do is to update your Asus routers so that you will not be the target of hackers. Here are all the necessary links for you to update your router, published by Bleeping Computer:

The firmware updates for these routers were all rolled out in the current year, starting with the AX56U_V2 receiving its firmware update in May 2023, followed by the RT-AC86U in July 2023, and the RT-AX55 in August 2023.

If your router is affected, it’s crucial to check your current firmware version promptly. After confirming and, if necessary, updating it, it’s advisable to disable remote access to your router.

Onur Demirkol

Onur Demirkol

Onur is a Turkish content writer who has been in the field since 2018 with a background in gaming, esports, and technology. Journalism and Creative Writing are two of his motivations in his work life, combined with technology and gaming, his lifelong passions. Studying abroad gave him a different perspective on life; now, he uses his experiences to influence and inform as many as possible.

Latest from Onur Demirkol

Editorial Guidelines