攻擊者可以輕易獲取路由器最高權限, 從由修改路由器設定, 並可以運行程式碼.
請大家儘速至華碩官網更新.
路由器的封位版本 只要是 3.0.0.4.380.7378 或以上版本, 代表你的路由器已是補洞完成 XD
40 models of the Asus RT line of home routers are affected by five vulnerabilities
that allow an attacker to get ahold of the router password, change router settings
without authentication, execute code, and exfiltrate router data.
安全性修正
- 修正 CVE-2017-5891.
- 修正 CVE-2017-5892.
- 修正 CVE-2017-6547.
- 修正 CVE-2017-6549.
- 修正 CVE-2017-6548.
受影響的路由器型號:
RT-AC51U
RT-AC52U B1
RT-AC53
RT-AC53U
RT-AC55U
RT-AC56R
RT-AC56S
RT-AC56U
RT-AC66U
RT-AC68U
RT-AC68UF
RT-AC66R
RT-AC66U
RT-AC66W
RT-AC68W
RT-AC68P
RT-AC68R
RT-AC68U
RT-AC87R
RT-AC87U
RT-AC88U
RT-AC1200
RT-AC1750
RT-AC1900P
RT-AC3100
RT-AC3200
RT-AC5300
RT-N11P
RT-N12 (D1 version only)
RT-N12+
RT-N12E
RT-N16
RT-N18U
RT-N56U
RT-N66R
RT-N66U (B1 version only)
RT-N66W
RT-N300
RT-N600
RT-4G-AC55U
剛在網路上看到這消息, 立馬更新我路由器之一 ASUS RT-N16