Upgrade Warranty: Here.
* Please note that the availability of the Premium Care product lines might differ by country.
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
This model was end of its life, and its firmware, utility, website, and manual will no longer be updated. For more details, please refer to https://www.asus.com/event/network/eol-product/
Fixed a DDoS vulnerability
Please unzip the firmware file first then check the MD5 code.
MD5: ea7270d51e76d8063538325ad909d184
Security fixes:
- Fixed Reflected XSS vulnerability.
- Fixed CSRF vulnerability.
- Fixed command injection vulnerability.
- Fixed stack buffer overflow vulnerability.
Thanks for Rick Ramgattie contribution.
Please unzip the firmware file first then check the MD5 code.
MD5:6db7559fc88838f5f169915143ec6a6
- Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighttpd.
- Fixed AiCloud login bugs.
- Modified Quick Internet Setup wizard process.
Please unzip the firmware file first then check the MD5 code.
MD5: 4bd7bb010e85b3b04b39ee7be5b12a8a
Fixed KRACK vulnerability
Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
Fixed CVE-2017-14492: DHCP - heap based overflow
Fixed CVE-2017-14493: DHCP - stack based overflow
Fixed CVE-2017-14494: DHCP - info leak
Fixed CVE-2017-14495: DNS - OOM DoS
Fixed CVE-2017-14496: DNS - DoS Integer underflow
Fixed CVE-2017-13704: Bug collision
Fixed AiCloud 2.0 Reflected XSS Vulnerability. Thanks to Guy Arazi and Niv Levi contribution.
Thanks to Guy Arazi for following vulnerabilities.
- AiCloud 2.0 Stored XSS Share link manager.
- AiCloud 2.0 Reflected XSS - "share a link"
- Download Master HTTP service DoS vulnerability.
- Download Master Reflected XSS Main login.
- Fixed Smart Sync Stored XSS vulnerabilities.
Please unzip the firmware file first then check the MD5 code.
MD5: 4c8d56468cd36bea0be20e22a0f1bc9d