First published: Mon Nov 21 2011(Updated: )
QIS_wizard.htm on the ASUS RT-N56U router with firmware before 1.0.1.4o allows remote attackers to obtain the administrator password via a flag=detect request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-N56U firmware | =1.0.1.2 | |
ASUS RT-N56U firmware | =1.0.0.9 | |
ASUS RT-N56U firmware | =1.0.1.3 | |
ASUS RT-N56U firmware | <=1.0.1.4 | |
ASUS routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4497 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2011-4497, update the ASUS RT-N56U router firmware to version 1.0.1.4 or later.
CVE-2011-4497 allows remote attackers to obtain the administrator password, compromising router security.
If your ASUS RT-N56U router is running firmware versions up to 1.0.1.4, it is vulnerable to CVE-2011-4497.
After fixing CVE-2011-4497, ensure to regularly check for firmware updates and secure your router settings.