First published: Tue Nov 04 2014(Updated: )
ASUS RT-AC68U, RT-AC66R, RT-AC66U, RT-AC56R, RT-AC56U, RT-N66R, RT-N66U, RT-N56R, RT-N56U, and possibly other RT-series routers before firmware 3.0.0.4.376.x do not verify the integrity of firmware (1) update information or (2) downloaded updates, which allows man-in-the-middle (MITM) attackers to execute arbitrary code via a crafted image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS TM-AC1900 | =3.0.0.4.376_3169 | |
ASUS RT series firmware | <=3.0.0.4.374.x | |
ASUS RT-AC56R Firmware | ||
ASUS rt-ac66r firmware | ||
ASUS RT-AC66U firmware | ||
ASUS 4G-AC68U | ||
ASUS RT-N56R | ||
ASUS routers | ||
ASUS RT-N66R | ||
Asus EA-N66 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2718 has been categorized as a critical vulnerability due to the potential for man-in-the-middle attacks on affected routers.
To fix CVE-2014-2718, users should update their ASUS RT series router firmware to version 3.0.0.4.376.x or later.
Devices affected by CVE-2014-2718 include various ASUS RT series routers such as RT-AC68U, RT-AC66R, RT-AC66U, and others prior to the specified firmware version.
CVE-2014-2718 allows attackers to perform man-in-the-middle (MITM) attacks by exploiting the lack of integrity verification for firmware updates.
There are no effective workarounds for CVE-2014-2718, and updating the firmware to a fixed version is the recommended solution.