go to Content
:::

TWCERT/CC Taiwan Computer Emergency Response Team/Coordination Center

:::
Date:
Font-stze:

ASUS Router - Upload arbitrary firmware

TVN ID TVN-202406011
CVE ID CVE-2024-3912
CVSS 9.8 (Critical)
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-N14U, DSL-N14U_B1, DSL-N12U_C1, DSL-N12U_D1, DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U
Description Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.
Solution Update following models to version 1.1.2.3_792 or later:
DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U

Update following models to version 1.1.2.3_807 or later:
DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1

Update following models to version 1.1.2.3_999 or later:
DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U

The following models are no longer maintained, and it is recommended to retire and replace them.
DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55
If replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.
Credit Carlos Köpke (PLASMALABS)
Public Date 2024-06-14
Top