© 2024 CoolTechZone - Latest tech news,
product reviews, and analyses.

ASUS releases patches for several router models


Taiwanese manufacturer ASUS has released an update for seven different router models, containing a critical vulnerability that lets attackers bypass authentication.

The exploit is known as CVE-2024-3080, which has a CVSS-scoring of 9.8 on a scale from 1 to 10. ‘CVSS’ is short for Common Vulnerability Scoring System and indicates the severity of an exploit. The higher the score, the more severe the vulnerability.

The vulnerability that ASUS found lets hackers remotely log into routers without authentication. According to the tech company, CVE-2024-3080 affects the following models:

· ZenWiFi XT8 version 3.0.0.4.388_24609 and earlier;

· ZenWiFi XT8 version V2 3.0.0.4.388_24609 and earlier;

· RT-AX88U version 3.0.0.4.388_24198 and earlier;

· RT-AX58U version 3.0.0.4.388_23925 and earlier;

· RT-AX57 version 3.0.0.4.386_52294 and earlier;

· RT-AC86U version 3.0.0.4.386_51915 and earlier; and

· RT-AC68U version 3.0.0.4.386_51668 and earlier.

ASUS advises users to immediately download and install the latest firmware that’s available for each model. Instructions on how to update the firmware of your router you'll find on ASUS' FAQ page.

If you’re unable to download the update, make sure you’re using a strong password to secure your account and Wi-Fi connection. Another option is to disable internet access to the router’s admin panel.

Second critical vulnerability found

The Taiwanese Computer Emergency Response Team, also known as TWCERT, found a second vulnerability named CVE-2024-3912. This exploit also has a CVSS-score of 9.8 and allows attackers to execute system commands on a device.

This exploit was discovered on the following router models: DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1, DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U en DSL-AC56U.

The flaw was also found on DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55. These devices however are labeled end-of-life, meaning they won’t receive a firmware update. To make sure your device is safe, it’s best to buy a new router with up-to-date security patches, or close all internet access.


Leave a Reply

Your email address will not be published. Required fields are marked