The safety deficit allows the attackers to skip the authentication and perform commands remotely. It is stated that the vulnerability is a significant risk because it can be used without the need for authorization. In addition, the use of this vulnerability may allow attackers to infecify the devices of malicious software or to organize DDOS attacks using user devices.

The vulnerability affects various router models, which are the result of incorrect management of authentication processes. ASUS has released product software updates for touched versions, including 3.0.0.4_382, 3.0.0.4_386, 3.0.4_388 and 3.0.0.6_102 versions, and strongly recommends users’ defeat to the latest version.

To protect the wireless network and router control panel, users are recommended to install unique passwords with at least 10 characters length. For devices with a full -time asus support period, it recommends that you disable AICLOD function and access to WAN and disable various functions: port reduction, DDNS, VPN servers, DMZ and FTP services.

Source: Ferra

Previous article10 Neonov oboev -d. IPhone. RAZNOOYOBRAZ -RTRABOHYY -STOL
Next articleIn Android 16, any application for Linux Terminal will be able to allocate memory 20 April 2025, 20:15
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here