
ASUS has shipped device updates to deal with a essential safety flaw impacting its routers that may be exploited via malicious actors to avoid authentication.
Tracked as CVE-2024-3080, the vulnerability carries a CVSS ranking of 9.8 out of a most of 10.0.
“Positive ASUS router fashions have authentication bypass vulnerability, permitting unauthenticated faraway attackers to log within the instrument,” in keeping with an outline of the flaw shared via the Taiwan Laptop Emergency Reaction Workforce / Coordination Middle (TWCERT/CC).
Additionally patched via the Taiwanese corporate is a high-severity buffer overflow flaw tracked as CVE-2024-3079 (CVSS ranking: 7.2) that may be weaponized via faraway attackers with administrative privileges to execute arbitrary instructions at the instrument.

In a hypothetical assault situation, a nasty actor may just model CVE-2024-3080 and CVE-2024-3079 into an exploit chain so as to sidestep authentication and execute malicious code on prone gadgets.
Each the shortcomings have an effect on the next merchandise –
- ZenWiFi XT8 model 3.0.0.4.388_24609 and previous (Fastened in 3.0.0.4.388_24621)
- ZenWiFi XT8 model V2 3.0.0.4.388_24609 and previous (Fastened in 3.0.0.4.388_24621)
- RT-AX88U model 3.0.0.4.388_24198 and previous (Fastened in 3.0.0.4.388_24209)
- RT-AX58U model 3.0.0.4.388_23925 and previous (Fastened in 3.0.0.4.388_24762)
- RT-AX57 model 3.0.0.4.386_52294 and previous (Fastened in 3.0.0.4.386_52303)
- RT-AC86U model 3.0.0.4.386_51915 and previous (Fastened in 3.0.0.4.386_51925)
- RT-AC68U model 3.0.0.4.386_51668 and previous (Fastened in 3.0.0.4.386_51685)
Previous this January, ASUS patched any other essential vulnerability tracked as (CVE-2024-3912, CVSS ranking: 9.8) that would allow an unauthenticated faraway attacker to add arbitrary information and execute gadget instructions at the instrument.
Customers of affected routers are recommended to replace to the newest model to protected towards possible threats.