First published: Fri Apr 26 2024(Updated: )
Incorrect Access Control in ASUS RT-N12+ B1 and RT-N12 D1 routers allows local attackers to obtain root terminal access via the the UART interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ASUS RT-N12HP B1 Firmware | ||
ASUS RT-N12 D1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-28326 is classified as high due to the incorrect access control that allows local attackers to gain root terminal access.
To fix CVE-2024-28326, ensure that the firmware of ASUS RT-N12+ B1 and RT-N12 D1 routers is updated to the latest version provided by ASUS.
CVE-2024-28326 affects users of ASUS RT-N12+ B1 and RT-N12 D1 routers, especially those with older firmware versions.
The impact of CVE-2024-28326 is that local attackers can exploit the vulnerability to obtain root access, potentially compromising the entire router.
No, CVE-2024-28326 is not a remote vulnerability; it requires local access to exploit the UART interface of the affected routers.