First published: Mon Jan 30 2017(Updated: )
An issue was discovered on the ASUS RT-N56U Wireless Router with Firmware 3.0.0.4.374_979. When executing an "nmap -O" command that specifies an IP address of an affected device, one can crash the device's WAN connection, causing disconnection from the Internet, a Denial of Service (DoS). The attack is only possible from within the local area network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-N56U firmware | =3.0.0.4.374_979 | |
ASUS routers | ||
All of | ||
ASUS RT-N56U firmware | =3.0.0.4.374_979 | |
ASUS routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5632 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2017-5632, update the ASUS RT-N56U firmware to a version that is not affected by this vulnerability.
CVE-2017-5632 affects the ASUS RT-N56U Wireless Router running firmware version 3.0.0.4.374_979.
Yes, CVE-2017-5632 can be exploited remotely by using an 'nmap -O' command targeting the device's IP address.
The consequence of CVE-2017-5632 is that it causes a Denial of Service, disrupting the device's WAN connection and its internet connectivity.