CVE-2017-11420

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical stack-based buffer overflow vulnerability in the networkmap component of ASUS router firmware. Remote attackers can execute arbitrary code by sending specially crafted device information that triggers the overflow during string concatenation. This affects numerous ASUS router models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • ASUS RT-AC5300
  • RT_AC1900P
  • RT-AC68U
  • RT-AC68P
  • RT-AC88U
  • RT-AC66U
  • RT-AC66U_B1
  • RT-AC58U
  • RT-AC56U
  • RT-AC55U
  • RT-AC52U
  • RT-AC51U
  • RT-N18U
  • RT-N66U
  • RT-N56U
  • RT-AC3200
  • RT-AC3100
  • RT_AC1200GU
  • RT_AC1200G
  • RT-AC1200
  • RT-AC53
  • RT-N12HP
  • RT-N12HP_B1
  • RT-N12D1
  • RT-N12+
  • RT_N12+_PRO
  • RT-N16
  • RT-N300
Versions: Vulnerable firmware versions prior to patches released in July 2017
Operating Systems: Asuswrt-Merlin firmware, ASUS stock firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both stock ASUS firmware and Asuswrt-Merlin custom firmware. The networkmap service is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the router, enabling traffic interception, credential theft, network pivoting, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to router compromise, allowing attackers to modify DNS settings, intercept traffic, or join the device to a botnet.

🟢

If Mitigated

If patched or properly segmented, impact is limited to denial of service or local network compromise rather than internet-facing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details were publicly disclosed in July 2017. The vulnerability is remotely exploitable without authentication and has a straightforward exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions released after July 2017

Vendor Advisory: https://asuswrt.lostrealm.ca/changelog

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Administration > Firmware Upgrade. 3. Download latest firmware from ASUS support site. 4. Upload and install firmware. 5. Reboot router after installation.

🔧 Temporary Workarounds

Disable networkmap service

linux

Temporarily disable the vulnerable networkmap service to prevent exploitation

telnet into router and run: service stop_networkmap
Or via SSH: killall networkmap

Block external access to router admin interface

all

Configure firewall to block WAN access to router management ports

In router admin: Firewall > Enable DoS protection
Firewall > Enable SPI firewall
Administration > System > Enable Web Access from WAN: No

🧯 If You Can't Patch

  • Segment routers on isolated network VLAN
  • Implement strict network ACLs to limit router access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Administration > Firmware Upgrade. Compare against patched versions from July 2017 onward.

Check Version:

In router admin interface or via SSH: nvram get buildno

Verify Fix Applied:

Verify firmware version is newer than vulnerable versions. Test by attempting to trigger the overflow with proof-of-concept code (in controlled environment).

📡 Detection & Monitoring

Log Indicators:

  • Unusual networkmap process crashes
  • Large device information strings in network logs
  • Unexpected process spawns from networkmap

Network Indicators:

  • Unusual traffic to router management ports (typically 80, 443, 8080)
  • Large UDP/TCP packets to router on network discovery ports

SIEM Query:

source="router.log" AND ("networkmap" OR "ASUS_Discovery") AND ("crash" OR "buffer" OR "overflow")

🔗 References

📤 Share & Export