ASUS routers RT-AX55, RT-AX56U_V2, and RT-AC86U are affected by three critical remote code execution vulnerabilities that can potentially allow threat actors to take over the devices.
The three vulnerabilities were reported by the Taiwanese CERT, below are their descriptions:
Attackers can trigger the above issues by providing specially crafted input to certain administrative API functions on the devices.
The flaws impact firmware versions 3.0.0.4.386_50460, 3.0.0.4.386_50460, and 3.0.0.4_386_51529 of the RT-AX55, RT-AX56U_V2, and RT-AC86U ASUS routers.
The vendor states that the following firmware versions address the vulnerabilities:
The vendor urges customers to apply security updates as soon as possible.
ASUS recommends turning off the remote administration (WAN Web Access) feature as a workaround.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, routers)
Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…
Apple confirmed that a security flaw in its Messages app was actively exploited in the…
Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…
Security researchers at Citizen Lab revealed that Paragon's Graphite spyware can hack fully updated iPhones…
Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…
This website uses cookies.