Protect Your ASUS Router: Command Injection Vulnerability Discovered

CVECVE-2023-39236
CVSScvssV3_1: 8.8
SourceCVE-2023-39236

A critical vulnerability has been discovered in ASUS routers that could allow remote attackers to take control of devices.

The issue is located in the traffic analyzer function of ASUS RT-AC86U routers. This tool is meant to help users monitor network activity but does not properly sanitize special characters that could be used to execute commands. By sending specially crafted requests, an attacker may be able to exploit this and run code of their choice on the router.

Once command injection is achieved, an attacker would have full administrative access to the router. They could then disrupt connectivity, view passwords and sensitive data passing through the network, install malware, or use it to attack other devices.

The best way for ASUS RT-AC86U owners to protect themselves is to update their router firmware as soon as a patch becomes available. Regularly checking for and installing security updates is important for any connected device. Users should also consider changing default passwords and enabling administrative access controls if available.

While patches are in development, limiting external access to the router admin interface as much as possible can help reduce risks. Staying vigilant about new advisories and keeping all software up-to-date helps keep these critical systems secure.

References