TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Multiple Vulnerabilities in ASUS Routers

91 pointsby nwcsabout 8 years ago

14 comments

_b8r0about 8 years ago
ASUS uses their own Linux distro called ASUSWRT, whenever I&#x27;ve looked at it it&#x27;s been, well ... <i>interesting</i> from a security perspective, even compared to other WRT OSes.<p>I did a ton of stuff on the AC series and some of their smaller hardware (like the WL330-NUL which is an awesome little thing but riddled with bugs). The bottom line is that if you have an ASUS, you should expect bugs.<p>If you&#x27;re worried about being exploited via your router, making sure you use a dedicated browser to configure a router and have no other web pages open at the time will help against certain classes of bug, as will logging out immediately after you&#x27;ve finished. Making sure that you know what&#x27;s being forwarded is also useful, as is turning off UPNP.<p>OpenWRT is a little bit better (but people tend not to update their routers) but has it&#x27;s flaws for various reasons (mostly in the web interface), as do most of the WRTs. If you&#x27;re really worried, Mikrotiks tend to be better, and very little beats an OpenBSD firewall.
mszczabout 8 years ago
This always boggles my mind. The hardware on those seems decent enough but the software is almost universally utter dog shit. Why do these companies treat the software (security as well as UX) side so poorly, considering that this is what the enduser sees, is beyond me.<p>I bought one of those affected routers recently. Since the DD-WRT has slower Wifi performance for that model I considered staying with the stock firmware... for about 30 minutes. When configuring something device names I think I used &#x27;-&#x27; in a name. The Web UI allowed it and saved it. On refresh the JS was all broken because of that character. No device list for me. Flashed it with DD-WRT, never looked back.
评论 #14310371 未加载
callahadabout 8 years ago
If you&#x27;re using Asuswrt-Merlin, looks like these fixes are only available in the current 380.66 Beta builds: <a href="https:&#x2F;&#x2F;github.com&#x2F;RMerl&#x2F;asuswrt-merlin&#x2F;blob&#x2F;0e15da3404ccabbf13509a911c7ddc4a5efa5461&#x2F;Changelog.txt#L5" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;RMerl&#x2F;asuswrt-merlin&#x2F;blob&#x2F;0e15da3404ccabb...</a>
评论 #14310464 未加载
jacobsenscottabout 8 years ago
The usual wifi router security rules apply:<p>- change the default password - keep the firmware updated - disable WPS. - If possible change the port the web interface is running on (don&#x27;t use port 80 or 443) - disable the web interface if you are command line savvy. - disable wifi access to the web interface (require ethernet)
评论 #14311214 未加载
vlodabout 8 years ago
Is it time to get a &quot;grown-up&quot; firewall for my home?<p>I&#x27;m currently using a standard Apple Time Machine as a firewall&#x2F;router, but with all this crap (crap router software&#x2F;hack attempts&#x2F;NSA shenanigans) going on, thinking about putting something more serious in front of it (connected to my broadband modem). Yeah.. I realize I&#x27;m sounding paranoid.. ;)<p>I&#x27;m thinking of Protectli&#x27;s &quot;Firewall Micro Appliance&quot; <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;dp&#x2F;B01H2QJTM4" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;dp&#x2F;B01H2QJTM4</a><p>I believe it&#x27;s FreeBSD and comes with pfSense. Thoughts?
评论 #14310857 未加载
评论 #14311506 未加载
评论 #14314111 未加载
评论 #14311191 未加载
acdabout 8 years ago
Routers should run open source software so vulnerabilities can be patched by the community.<p>Routers manufacturers wants to push the latest hardware for profit. The only reason router manufacturers want to patch security vulnerabilities is negative press articles. Negative press would hurt future sales so its better to patch the current product line. When current product line is no longer sold security patches stops but the use of the device by its users Continues.<p>This is the reason we need to open source everything.<p>If it can be hacked it will be hacked.
mjevansabout 8 years ago
Looks like anyone using third party firmware (such as <a href="https:&#x2F;&#x2F;wiki.openwrt.org&#x2F;toh&#x2F;start" rel="nofollow">https:&#x2F;&#x2F;wiki.openwrt.org&#x2F;toh&#x2F;start</a> ) shouldn&#x27;t be affected by the issues this advisory highlights.
评论 #14310198 未加载
tracker1about 8 years ago
This is one thing that pisses me off, more about the FCC who requested the routers be fully locked down... I used to buy all ASUS as before the change it was very easy to get third party (Tomato) firmware on them that was updated more regularly.
nigmaabout 8 years ago
The 4G-AC55U router is also vulnerable but did not receive a security firmware update (last firmware release was a year ago on 2016-05-20) and is not listed on the page.<p>If you happen to be running this device you may want to apply precautionary measures.
10165about 8 years ago
Am I the only user who does <i>not</i> want a web interface on a router?
评论 #14310280 未加载
michaelmcmillanabout 8 years ago
Why don&#x27;t routers simply host their admin panels on a separate and secured wireless network that is blocked from the internet? Although it sounds impractical, it would render so many of these CSRF&#x2F;XSS exploits useless.
评论 #14310404 未加载
评论 #14310327 未加载
lostmsuabout 8 years ago
I wonder why some routers are not listed as vulnerable (I have N65U)
busterarmabout 8 years ago
Title should have the word &#x27;again&#x27; at the end.
tmalyabout 8 years ago
does this affect the asus black diamond router?<p>The web interface to update the firmware has never worked for me.
评论 #14309764 未加载