Multiple vulnerabilities in ASUS Routers



Published: 2023-06-20
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2023-28702
CVE-2022-46871
CVE-2018-1160
CVE-2022-26376
CVE-2023-28703
CWE-ID CWE-78
CWE-119
CWE-787
CWE-121
Exploitation vector Network
Public exploit Public exploit code for vulnerability #3 is available.
Vulnerable software
Subscribe
TUF-AX5400
Hardware solutions / Routers & switches, VoIP, GSM, etc

TUF-AX6000
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX58U
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX82U
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX86S
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX86U
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX86U PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc

ZenWiFi XT8_V2
Hardware solutions / Routers & switches, VoIP, GSM, etc

ZenWiFi XT8
Hardware solutions / Routers & switches, VoIP, GSM, etc

ZenWiFi XT9
Hardware solutions / Routers & switches, VoIP, GSM, etc

GS-AX3000
Hardware solutions / Routers & switches, VoIP, GSM, etc

GS-AX5400
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT-AX11000
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT-AX6000
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT-AXE11000
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT-AXE11000 PRO
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT-AXE16000
Hardware solutions / Routers & switches, VoIP, GSM, etc

GT6
Hardware solutions / Routers & switches, VoIP, GSM, etc

RT-AX3000
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Asus

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) OS Command Injection

EUVDB-ID: #VU77536

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-28702

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TUF-AX5400: before 3.0.0.4.388.23285

TUF-AX6000: before 3.0.0.4.388.31927

RT-AX58U: before 3.0.0.4.388.23403

RT-AX82U: before 3.0.0.4.388.23285

RT-AX86S: before 3.0.0.4.388.23285

RT-AX86U: before 3.0.0.4.388.23285

RT-AX86U PRO: before 3.0.0.4.388.23285

ZenWiFi XT8_V2: before 3.0.0.4.388.23285

ZenWiFi XT8: before 3.0.0.4.388.23285

ZenWiFi XT9: before 3.0.0.4.388.23285

GS-AX3000: before 1.4.8.3

GS-AX5400: before 3.0.0.4.388.23012

GT-AX11000: before 3.0.0.4.388.23285

GT-AX6000: before 3.0.0.4.388.23285

GT-AXE11000: before 3.0.0.4.388.23482

GT-AXE11000 PRO: before 3.0.0.4.388.23285

GT-AXE16000: before 3.0.0.4.388.23012

GT6: before 3.0.0.4.388.23145

RT-AX3000: before 3.0.0.4.388.23403

External links

http://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU70145

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-46871

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in libusrsctp. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TUF-AX5400: before 3.0.0.4.388.23285

TUF-AX6000: before 3.0.0.4.388.31927

RT-AX58U: before 3.0.0.4.388.23403

RT-AX82U: before 3.0.0.4.388.23285

RT-AX86S: before 3.0.0.4.388.23285

RT-AX86U: before 3.0.0.4.388.23285

RT-AX86U PRO: before 3.0.0.4.388.23285

ZenWiFi XT8_V2: before 3.0.0.4.388.23285

ZenWiFi XT8: before 3.0.0.4.388.23285

ZenWiFi XT9: before 3.0.0.4.388.23285

GS-AX3000: before 1.4.8.3

GS-AX5400: before 3.0.0.4.388.23012

GT-AX11000: before 3.0.0.4.388.23285

GT-AX6000: before 3.0.0.4.388.23285

GT-AXE11000: before 3.0.0.4.388.23482

GT-AXE11000 PRO: before 3.0.0.4.388.23285

GT-AXE16000: before 3.0.0.4.388.23012

GT6: before 3.0.0.4.388.23145

RT-AX3000: before 3.0.0.4.388.23403

External links

http://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Out-of-bounds write

EUVDB-ID: #VU16646

Risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-1160

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in dsi_opensess.c. A remote attacker can trigger an out-of-bounds write and crash the affected application or execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TUF-AX5400: before 3.0.0.4.388.23285

TUF-AX6000: before 3.0.0.4.388.31927

RT-AX58U: before 3.0.0.4.388.23403

RT-AX82U: before 3.0.0.4.388.23285

RT-AX86S: before 3.0.0.4.388.23285

RT-AX86U: before 3.0.0.4.388.23285

RT-AX86U PRO: before 3.0.0.4.388.23285

ZenWiFi XT8_V2: before 3.0.0.4.388.23285

ZenWiFi XT8: before 3.0.0.4.388.23285

ZenWiFi XT9: before 3.0.0.4.388.23285

GS-AX3000: before 1.4.8.3

GS-AX5400: before 3.0.0.4.388.23012

GT-AX11000: before 3.0.0.4.388.23285

GT-AX6000: before 3.0.0.4.388.23285

GT-AXE11000: before 3.0.0.4.388.23482

GT-AXE11000 PRO: before 3.0.0.4.388.23285

GT-AXE16000: before 3.0.0.4.388.23012

GT6: before 3.0.0.4.388.23145

RT-AX3000: before 3.0.0.4.388.23403

External links

http://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Out-of-bounds write

EUVDB-ID: #VU65842

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-26376

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the httpd unescape functionality. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TUF-AX5400: before 3.0.0.4.388.23285

TUF-AX6000: before 3.0.0.4.388.31927

RT-AX58U: before 3.0.0.4.388.23403

RT-AX82U: before 3.0.0.4.388.23285

RT-AX86S: before 3.0.0.4.388.23285

RT-AX86U: before 3.0.0.4.388.23285

RT-AX86U PRO: before 3.0.0.4.388.23285

ZenWiFi XT8_V2: before 3.0.0.4.388.23285

ZenWiFi XT8: before 3.0.0.4.388.23285

ZenWiFi XT9: before 3.0.0.4.388.23285

GS-AX3000: before 1.4.8.3

GS-AX5400: before 3.0.0.4.388.23012

GT-AX11000: before 3.0.0.4.388.23285

GT-AX6000: before 3.0.0.4.388.23285

GT-AXE11000: before 3.0.0.4.388.23482

GT-AXE11000 PRO: before 3.0.0.4.388.23285

GT-AXE16000: before 3.0.0.4.388.23012

GT6: before 3.0.0.4.388.23145

RT-AX3000: before 3.0.0.4.388.23403

External links

http://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Stack-based buffer overflow

EUVDB-ID: #VU77537

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-28703

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the cgi function. A remote administrator can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

TUF-AX5400: before 3.0.0.4.388.23285

TUF-AX6000: before 3.0.0.4.388.31927

RT-AX58U: before 3.0.0.4.388.23403

RT-AX82U: before 3.0.0.4.388.23285

RT-AX86S: before 3.0.0.4.388.23285

RT-AX86U: before 3.0.0.4.388.23285

RT-AX86U PRO: before 3.0.0.4.388.23285

ZenWiFi XT8_V2: before 3.0.0.4.388.23285

ZenWiFi XT8: before 3.0.0.4.388.23285

ZenWiFi XT9: before 3.0.0.4.388.23285

GS-AX3000: before 1.4.8.3

GS-AX5400: before 3.0.0.4.388.23012

GT-AX11000: before 3.0.0.4.388.23285

GT-AX6000: before 3.0.0.4.388.23285

GT-AXE11000: before 3.0.0.4.388.23482

GT-AXE11000 PRO: before 3.0.0.4.388.23285

GT-AXE16000: before 3.0.0.4.388.23012

GT6: before 3.0.0.4.388.23145

RT-AX3000: before 3.0.0.4.388.23403

External links

http://www.asus.com/content/asus-product-security-advisory/#06/19/2023
http://www.hkcert.org/security-bulletin/asus-router-multiple-vulnerabilities_20230620


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###