BIG WARNING TO ALL USERS OF ASUS ROUTERS

This is a warning for a severe security issue with many Asus Routers.

Almost all RT-Axx and RT-Nxx routers and probably more have a directory traversal issue.

By just adding the parameter /tmp/lighttpd/permissions to the IP address or url of the router, the password file can be downloaded which contains all usernames and passwords of all users, including the administrator.

Even more worse, it is possible to execute any executable on the router or even upload or modify additional executable or files.

Asus is aware about this since June. There is no update available yet and even not a warning on their website.

This issue is so severe because those routers are quite easy to find e.g. by using the included shodan tool and by searching for asuscomm.com which is the suffix of the dynamic domain which will be created by Asus AiCloud service.

More worse and even another implementation flaw of Asus, by searching for this term, hackers will automatically know the first part of the dynamic dns entry (the part in front of asuscomm.com) which means that all routers that are being found by shodan can still be compromised even if the IP address has been changed meanwhile.

As there is no security update available yet, ALL those routers and ALL FILES in Asus AiCloud can be accessed as if there would be no password protection at all.
A single Search for such routers in Chicago returned 171 AiCloud devices and Berlin 130.

Scary!

Recommendations:

– Ideally, replace all Asus devices

If that’s not feasible :

– Switch off all AiCloud services (there are actually three) on your router
– Disable all UPnP services (which is even good for all other situations)
– Disable remote access
– Change all username and passwords

Stay tuned,

Marcus


Be carefull if you use a Ruckus device

If you are using a Ruckus Wireless router, doublecheck if you really have changed your default password as this router can be maintained from the internet and that can’t be switched off.

A quick search for Ruckus with the shodan tool reveals that many of those routers are installed worldwide and very likely, most of them will use the default username super and password sp-admin.

Affected devices are:

ZoneFlex 7731 802.11n Wireless Bridge
ZoneFlex 2942 802.11g Access Point
ZoneFlex 2741 802.11g Outdoor Access Point
ZoneFlex 7942 802.11n Access Point
ZoneFlex 7962 Dual Band 802.11n Access Point
ZoneFlex 7762 Dual Band 802.11n Outdoor Access Point
ZoneFlex 7762-S Dual Band 802.11n Outdoor Sector Access Point
ZoneFlex 7343 2.4GHz 802.11n Smart Wi-Fi Access Point
ZoneFlex 7363 Dual Band 802.11n Smart Wi-Fi Access Point

which all use the same pre defined username and password.

Moreover, the following devices even have an empty username and password:

ZoneDirector 1000
ZoneDirector 1100
ZoneDirector 3000

The default username and password will be added to the default password list of this app with the next data update.

Kind regards,

Marcus