CVE-2018-9285

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on affected ASUS routers via command injection in the pingCNT and destIP fields. Attackers can gain full control of the device without authentication. Users of specific ASUS router models with outdated firmware are affected.

💻 Affected Systems

Products:
  • ASUS RT-AC66U
  • RT-AC68U
  • RT-AC86U
  • RT-AC88U
  • RT-AC1900
  • RT-AC2900
  • RT-AC3100
  • RT-N18U
  • RT-AC87U
  • RT-AC3200
  • RT-AC5300
Versions: Before 3.0.0.4.384_10007 for most models, specific versions vary by model as listed in description
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface on port 80/443. Remote exploitation requires web interface to be exposed to untrusted networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router allowing attacker to intercept all network traffic, install persistent malware, pivot to internal network devices, and use router as botnet node.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of cryptocurrency miners or other malware.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and regular firmware updates are applied.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Exploitation requires sending crafted HTTP POST request to /apply.cgi with malicious SystemCmd parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by model: RT-AC66U/68U/86U/88U/1900/2900/3100: 3.0.0.4.384_10007+, RT-N18U: 3.0.0.4.382.39935+, RT-AC87U/3200: 3.0.0.4.382.50010+, RT-AC5300: 3.0.0.4.384.20287+

Vendor Advisory: https://www.asus.com/support/FAQ/1039524/

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to Administration > Firmware Upgrade. 3. Check for updates or manually download latest firmware from ASUS support site. 4. Upload and apply firmware update. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router web interface

In router web interface: Advanced Settings > Administration > System > Enable Web Access from WAN: No

Restrict web interface access

all

Limit web interface to specific IP addresses if remote access required

In router web interface: Advanced Settings > Administration > System > Allow only specified IP addresses: Yes, then add trusted IPs

🧯 If You Can't Patch

  • Replace affected router with supported model
  • Place router behind firewall with strict inbound rules blocking ports 80/443 from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in router web interface under Administration > Firmware Upgrade and compare with patched versions listed above.

Check Version:

curl -s http://router-ip/Main_Analysis_Content.asp | grep -i firmware || ssh admin@router-ip 'nvram get buildno'

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version. Test by attempting to access vulnerable endpoint with test payload (in controlled environment).

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /apply.cgi with SystemCmd parameter containing shell metacharacters
  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful command execution

Network Indicators:

  • Unusual outbound connections from router to suspicious IPs
  • DNS queries to malicious domains from router
  • Unexpected traffic patterns from router

SIEM Query:

source="router_logs" AND (url="/apply.cgi" AND (method="POST" AND (param="SystemCmd" AND value="*;*" OR value="*|*" OR value="*`*")))

🔗 References

📤 Share & Export