Patching Security Holes: ASUS Firmware Updates Resolve Multiple Vulnerabilities in Router Models

Reading Time: ( Word Count: )

June 20, 2023

ASUS, the Taiwanese company, has addressed multiple security vulnerabilities in its router models by releasing firmware updates. Nine security holes, two of which are rated as Critical and six as High severity, are to be fixed by the upgrades. There is one vulnerability that is currently awaiting analysis.

The impacted models comprise GT6, GT-AXE16000, GT-AX11000 PRO, GT-AXE11000, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400. 

The most prominent updates are CVE-2018-1160 and CVE-2022-26376, both of which received a score for severity of 9.8 out of 10 according to the CVSS scale.

CVE-2018-1160 describes an inaccessible write bug in Netatalk versions previous to 3.1.12. This bug, existing for nearly five years, could activate an unauthenticated, remote attacker to execute arbitrary code. CVE-2022-26376 is a memory corruption vulnerability found in the Asuswrt firmware. It can be exploited through a specially-crafted HTTP request.


The remaining seven flaws are as follows:

CVE-2022-35401 (CVSS rating: 8.1): A login bypass flaw enables an intruder to send nefarious inquiries via HTTP to the target system and get complete administrator rights.

Using unique network packets, details exposure weakness CVE-2022-38105 (CVSS rating: 7.5) allows access to private data.

CVE-2022-38393, with a CVSS rating of 7.5 a denial-of-service (DoS) flaw that can be exploited via a network packet that has been customized.

Utilizing a previous version of the libusrsctp library could expose susceptible systems to more attacks, according to CVE-2022-46871 (CVSS score: 8.8).

A command-and-control input weakness known as CVE-2023-28702 (CVSS rating: 8.8) enables local hackers to execute unauthorized system instructions, cause disruptions, or stop services.

A stack-based buffering issue known as CVE-2023-28703 (CVSS score: 7.2) enables an attacker with administrative rights to run unauthorized system instructions, cause system disruption, or stop functions. 

CVE-2023-31195 (CVSS 0.0, no assessment): a hole that allows an attacker-in-the-middle (AitM) to take over a user’s session.

ASUS highly urges customers to immediately apply the most recent updates to reduce security concerns. Users are advised to discontinue services from the WAN side to avoid any possible malicious activity.

The company also suggests that customers periodically conduct equipment audits and establish separate passwords for the wireless network and router administration page.

Saher Mahmood

Saher Mahmood


Saher is a cybersecurity researcher with a passion for innovative technology and AI. She explores the intersection of AI and cybersecurity to stay ahead of evolving threats.

Other interesting articles

Automated vs Manual Penetration Testing

Automated vs Manual Penetration Testing

Pentesting is largely divided into two methodologies: Automated vs Manual Penetration Testing. Both have ...
8 Steps in Penetration Testing You Should Know

8 Steps in Penetration Testing You Should Know

Mastering the art of penetration testing has become a critical ability for security experts to combat cyber ...
Spear Phishing vs Whaling: What is the Difference

Spear Phishing vs Whaling: What is the Difference

Spear phishing is a particularly devious type of phishing assault in which the individual targeted plays a ...
How Often Should Penetration Testing Be Done

How Often Should Penetration Testing Be Done

Penetration testing is a crucial technique that involves simulating a cyberattack on networks, computer systems, ...

Submit a Comment

Your email address will not be published. Required fields are marked *