This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical authentication bypass in ASUS WRT `infosvr` (specifically `common.c`).β¦
π‘οΈ **Root Cause**: The program **fails to correctly validate the requested MAC address**. This logic flaw allows unauthenticated requests to slip through the security checks.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: ASUS WRT firmware. Specifically tested on **RT-AC66U** and **RT-N66U** routers. The vulnerability lies in the `infosvr` component.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Remote attackers can **bypass authentication** entirely. They gain the ability to **execute arbitrary commands** with the privileges of the router's service.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Exploitation Threshold**: **LOW**. No authentication is required. Attackers simply send a specific UDP packet to port **9999**. It is a remote, unauthenticated exploit.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploits**: **YES**. Exploits are available on **Exploit-DB** (IDs 35688, 44524) and GitHub (`jduck/asus-cmd`). Wild exploitation is highly probable.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for open **UDP port 9999** on your router. Check if your firmware version is an older ASUS WRT build (pre-patch). Look for `infosvr` processes.
π§ **No Patch Workaround**: **Block UDP port 9999** at the firewall level. If possible, disable remote management or the `infosvr` service if not needed. Change default passwords as a secondary measure.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. Since it allows **remote command execution** without auth, it is a critical threat. Update firmware immediately or isolate the device from untrusted networks.