If you are using an Asus router, you are advised to run the most recent firmware. Three weak points for different devices can in fact allow, among other things, to connect remotely.
These are CVE-2024-3079, CVE-2024-3080 and CVE-2024-3912. The first is a buffer overflow vulnerability, which allows attackers with administrator rights to execute commands on the device. The second is a weak point in authentication, which allows a hacker to remotely connect to the device. Finally, CVE-2024-3912 also allows commands to be executed on the device due to a bug in the firmware.
The issue affects the following devices and their earlier versions:
- ZenWiFi XT8 3.0.0.4.388_24609
- ZenWiFi Version RT-AX57 3.0.0.4.386_52294
- ZenWiFi Version RT-AC86U 3.0.0.4.386_51915
- ZenWiFi Version RT-AC68U 3.0.0.4.386_51668
Asus currently has new firmware ready for affected devices. But routers that are no longer supported because they are at the end of their life will not receive it. This includes models DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, DSL-N16P, DSL-N16U, DSL-AC52 and DSL-AC55.
It is recommended that anyone who owns such a device and wishes to continue using it deactivates remote access (web access via the public Internet), virtual server (port forwarding), DDNS, VPN server, DMZ and port trigger.