CVE-2024-3912

ASUS Router - Upload arbitrary firmware

Description

Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.

Remediation

Solution:

  • Update following models to version 1.1.2.3_792 or later: DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U Update following models to version 1.1.2.3_807 or later: DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1 Update following models to version 1.1.2.3_999 or later: DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U The following models are no longer maintained, and it is recommended to retire and replace them. DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55 If replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.67% Top 30%
Third-Party Advisory org.tw Third-Party Advisory org.tw
Affected: ASUS DSL-N17U
Affected: ASUS DSL-N55U_C1
Affected: ASUS DSL-N55U_D1
Affected: ASUS DSL-N66U
Affected: ASUS DSL-N12U_C1
Affected: ASUS DSL-N12U_D1
Affected: ASUS DSL-N14U
Affected: ASUS DSL-N14U_B1
Affected: ASUS DSL-N16
Affected: ASUS DSL-AC51
Affected: ASUS DSL-AC750
Affected: ASUS DSL-AC52U
Affected: ASUS DSL-AC55U
Affected: ASUS DSL-AC56U
Affected: ASUS DSL-N10_C1
Affected: ASUS DSL-N10_D1
Affected: ASUS DSL-N10P_C1
Affected: ASUS DSL-N12E_C1
Affected: ASUS DSL-N16P
Affected: ASUS DSL-N16U
Affected: ASUS DSL-AC52
Affected: ASUS DSL-AC55
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-3912?
CVE-2024-3912 has been scored as a critical severity vulnerability.
How to fix CVE-2024-3912?
To fix CVE-2024-3912: Update following models to version 1.1.2.3_792 or later: DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U Update following models to version 1.1.2.3_807 or later: DSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1 Update following models to version 1.1.2.3_999 or later: DSL-N16, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U The following models are no longer maintained, and it is recommended to retire and replace them. DSL-N10_C1, DSL-N10_D1, DSL-N10P_C1, DSL-N12E_C1, ,DSL-N16P, DSL-N16U, DSL-AC52, DSL-AC55 If replacement is not possible in the short term, it is recommended to disable remote access (Web access from WAN), virtual servers (Port forwarding), DDNS, VPN server, DMZ, and port trigger.
Is CVE-2024-3912 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-3912 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-3912?
CVE-2024-3912 affects ASUS DSL-N17U, ASUS DSL-N55U_C1, ASUS DSL-N55U_D1, ASUS DSL-N66U, ASUS DSL-N12U_C1, ASUS DSL-N12U_D1, ASUS DSL-N14U, ASUS DSL-N14U_B1, ASUS DSL-N16, ASUS DSL-AC51, ASUS DSL-AC750, ASUS DSL-AC52U, ASUS DSL-AC55U, ASUS DSL-AC56U, ASUS DSL-N10_C1, ASUS DSL-N10_D1, ASUS DSL-N10P_C1, ASUS DSL-N12E_C1, ASUS DSL-N16P, ASUS DSL-N16U, ASUS DSL-AC52, ASUS DSL-AC55.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.