CVE-2017-14698

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to change passwords of arbitrary users on affected ASUS routers via the http_passwd parameter to mod_login.asp. Attackers can gain unauthorized administrative access without authentication. All users of the listed ASUS router models are affected.

💻 Affected Systems

Products:
  • ASUS DSL-AC51
  • DSL-AC52U
  • DSL-AC55U
  • DSL-N55U C1
  • DSL-N55U D1
  • DSL-AC56U
  • DSL-N10_C1
  • DSL-N12U C1
  • DSL-N12E C1
  • DSL-N14U
  • DSL-N14U-B1
  • DSL-N16
  • DSL-N16U
  • DSL-N17U
  • DSL-N66U
  • DSL-AC750
Versions: All firmware versions prior to patched releases
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administration interface of these routers. Remote administration must be enabled for internet exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attackers to change admin credentials, intercept all network traffic, install malware, and use the router as a pivot point into the internal network.

🟠

Likely Case

Attackers gain administrative access to the router, enabling them to change DNS settings, intercept traffic, and potentially compromise connected devices.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact is limited to the router itself, though attackers could still disrupt network connectivity.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to remote attackers.
🏢 Internal Only: LOW - This vulnerability requires access to the router's web interface, which is typically only accessible from the internal network or WAN side.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to mod_login.asp with crafted http_passwd parameter. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ASUS support site for each model's latest firmware

Vendor Advisory: https://www.asus.com/support/

Restart Required: Yes

Instructions:

1. Visit ASUS support site for your router model. 2. Download latest firmware. 3. Log into router admin panel. 4. Navigate to Administration > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Administration

all

Prevents exploitation from internet by disabling remote access to router admin interface

Restrict Admin Interface Access

all

Limit access to router admin interface to specific IP addresses or MAC addresses

🧯 If You Can't Patch

  • Replace affected routers with patched or different models
  • Place router behind another firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against latest available on ASUS support site. If not latest, assume vulnerable.

Check Version:

Log into router admin interface and check Firmware Version in System Status or similar section

Verify Fix Applied:

Verify firmware version matches latest patched version from ASUS. Test that password change requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful password change
  • HTTP POST requests to mod_login.asp with http_passwd parameter

Network Indicators:

  • Unusual HTTP traffic to router admin interface from external IPs
  • DNS configuration changes without authorized changes

SIEM Query:

source="router_logs" AND (uri="/mod_login.asp" OR method="POST" AND uri CONTAINS "login")

🔗 References

📤 Share & Export