Here is the link https://wwws.nightwatchcybersecurity.com/2017/05/09/multiple-vulnerabilities-in-asus-routers/Multiple Vulnerabilities in ASUS Routers [CVE-2017-5891 and CVE-2017-5892]
see the nightwatchcybersecurity site for details.
Various models of ASUS RT routers have several CSRF vulnerabilities allowing malicious sites to login and change settings in the router; multiple JSONP vulnerabilities allowing exfiltration of router data and an XML endpoint revealing WiFi passwords.
Most of these issues have been fixed by Asus in the March 2017 firmware update under v3.0.0.4.380.7378. One issue (JSONP information disclosure) remains unfixed since the vendor doesn’t consider it to be a security threat.
CVE-2017-5891 has been assigned to the CSRF issues, and CVE-2017-5892 to cover the non-CSRF issues.
Users should change the default credentials and apply the latest firmware released by ASUS, version v3.0.0.4.380.7378 or higher (except for 4G-AC55U which has no patches available).
There is no mitigation available for the issue #3 – JSONP information disclosure without login.
Just another reason not to expose the WebUI to WAN.
The posted vulnerabilities can only be exploited when WebUI is allowed. In most cases this is from the LAN side.
As I said, just another reason not to expose it.How is CSRF related to exposing the WebUI to the WAN?
CSRF happens through the web-browser of an already logged-in WAN/LAN/whatever WebUI user. Disabling WAN access of the WebUI doesn't stop CSRF.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!