AsusWRT.Lan.Unauthorized.Config.Change.Security.Bypass

description-logoDescription

This indicates an attack attempt to exploit an Security Bypass vulnerability in AsusWRT.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling certain HTTP Post requests. A remote attacker may be able to exploit this to modify the configuration, leading to further attacks.

affected-products-logoAffected Products

RT-AC88U 3.0.0.4.384_10007
RT-AC3100 3.0.0.4.384_10007
RT-AC86U 3.0.0.4.384_10007
RT-AC68U series 3.0.0.4.384_10007 , also include RT-AC68U/ 68R/ 68W/ AC1900/ 68U_White/ 68P/ 1900P/ 1900U
RT-AC66U_B1 series 3.0.0.4.384_10007, also include AC1750_B1

Impact logoImpact

Security Bypass: Remote attackers can bypass security features of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.asus.com/Static_WebPage/ASUS-Product-Security-Advisory/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-06 14.627 Severity:high:critical

References

43881