CVE-2023-39086

7.5 HIGH

📋 TL;DR

ASUS RT-AC66U B1 routers transmit sensitive information without encryption, allowing attackers on the same network to intercept credentials and configuration data. This affects users of ASUS RT-AC66U B1 routers running firmware version 3.0.0.4.286_51665.

💻 Affected Systems

Products:
  • ASUS RT-AC66U B1
Versions: 3.0.0.4.286_51665
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version only; other versions may have different behavior.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept administrative credentials and gain full control of the router, enabling network traffic interception, malware injection, and lateral movement to connected devices.

🟠

Likely Case

Local network attackers capture login credentials and sensitive configuration data, potentially compromising router administration and network security.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to credential exposure requiring reset and potential configuration review.

🌐 Internet-Facing: MEDIUM - While the vulnerability itself is local, internet-facing routers could have their credentials exposed if attackers gain initial access through other means.
🏢 Internal Only: HIGH - Attackers on the local network can easily intercept unencrypted sensitive data without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication; basic packet sniffing tools can capture cleartext data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ASUS for latest firmware > 3.0.0.4.286_51665

Vendor Advisory: http://asus.com

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Administration > Firmware Upgrade. 3. Check for updates or manually download latest firmware from ASUS support site. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote administration

all

Prevents external access to router management interface

Navigate to Administration > System > Enable Web Access from WAN: Set to No

Use wired connection for administration

all

Reduces wireless sniffing risk during sensitive operations

🧯 If You Can't Patch

  • Segment router management to separate VLAN isolated from user devices
  • Implement network monitoring for cleartext authentication attempts and unusual traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Administration > Firmware Upgrade

Check Version:

Login to router web interface and check firmware version in System Information

Verify Fix Applied:

Verify firmware version is newer than 3.0.0.4.286_51665 and test with network sniffer to confirm sensitive data is encrypted

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts after credential exposure
  • Unusual configuration changes

Network Indicators:

  • Cleartext HTTP traffic containing authentication or configuration data on port 80
  • ARP spoofing or unusual MAC addresses on local network

SIEM Query:

source="router.log" AND ("authentication" OR "login") AND protocol="HTTP"

🔗 References

📤 Share & Export