Three critical vulnerabilities discovered in Asus routers

Three critical vulnerabilities discovered in Asus routers
Three critical vulnerabilities discovered in Asus routers

If you are using an Asus router, you are advised to run the most recent firmware. Three weak points for different devices can in fact allow, among other things, to connect remotely.

These are CVE-2024-3079, CVE-2024-3080 and CVE-2024-3912. The first is a buffer overflow vulnerability, which allows attackers with administrator rights to execute commands on the device. The second is a weak point in authentication, which allows a hacker to remotely connect to the device. Finally, CVE-2024-3912 also allows commands to be executed on the device due to a bug in the firmware.

The issue affects the following devices and their earlier versions:

  • ZenWiFi XT8 3.0.0.4.388_24609
  • ZenWiFi Version RT-AX57 3.0.0.4.386_52294
  • ZenWiFi Version RT-AC86U 3.0.0.4.386_51915
  • ZenWiFi Version RT-AC68U 3.0.0.4.386_51668

Asus currently has new firmware ready for affected devices. But routers that are no longer supported because they are at the end of their life will not receive it. This includes models DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, DSL-N16P, DSL-N16U, DSL-AC52 and DSL-AC55.

It is recommended that anyone who owns such a device and wishes to continue using it deactivates remote access (web access via the public Internet), virtual server (port forwarding), DDNS, VPN server, DMZ and port trigger.

-

-

PREV A folding smartphone for less than €600? It’s possible with this summer sale offer on the Motorola RAZR 40
NEXT Comics City: the 100% superhero escape game at Captive Live Escape Game