![]() We believe that this vulnerability is a regression that was inadvertently reintroduced in the previous firmware version (in our case, the test device was a RT-AC3200 running firmware 3.0.0.4.382_19466). Technically, vulnerable models are prone to OS command injections via unsanitized parameters passed to the /apply.cgi. If a criminal is able to access that portal, or if he can trick you into following a malicious link, he will be able to execute an HTTP request that injects operating system commands that can run directly on the router. If, however, you depend on that feature, we suggest setting a strong password and only using HTTPS for router administrative tasks. If your web management portal is available via your WAN connection, and you don’t use that feature, we recommend disabling it (it’s not the default parameter). If you are not sure which model or firmware you are using, I recommend double-checking the ASUS support website to get the latest information and updates.įG-VD-17-216 is an ASUS authenticated remote code execution vulnerability that FortiGuard Labs originally discovered and reported (CVE-2018-9285). The models listed at the end of this post are known to be vulnerable. Over the last few weeks, ASUS released a series of patches aimed at addressing a number of vulnerabilities discovered in their RT routers running AsusWRT firmware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |