what you don't know can hurt you

ASUS Router Authentication Bypass / Cross Site Scripting

ASUS Router Authentication Bypass / Cross Site Scripting
Posted Feb 22, 2014
Authored by Harry Sintonen

ASUS routers suffer from authentication bypass and cross site scripting vulnerabilities, among the recent flurry of other issues that have surfaced.

tags | exploit, vulnerability, xss, bypass
SHA-256 | 6edc73bc09482eb4146ba7e7fb7884eac6f18e8dcfb66db1d1ad2bd22fd6087e

ASUS Router Authentication Bypass / Cross Site Scripting

Change Mirror Download
ASUS router drive-by code execution via XSS and authentication bypass
The latest version of this advisory is available at:


Various ASUS routers contain reflected Cross-Site Scripting (CWE-79) and
authentication bypass (CWE-592) vulnerabilities that can be exploited to
gain remote administrative access to the devices.


Several ASUS routers include reflected Cross-Site Scripting (CWE-79) and
authentication bypass (CWE-592) vulnerabilities. An attacker who can lure
a victim to browse to a web site containing a specially crafted JavaScript
payload can execute arbitrary commands on the router as administrator
(root). No user interaction is required.


An attacker can create a JavaScript payload that uses an exploit to unearth
the administrative password from the victim's ASUS router and logs in to
the device. Once logged in the payload can perform administrative actions,
including arbitrary command execution as administrator (root).


The CSRF vulnerability CVE-2013-3093 discovered by Jacob Holcomb /
Independent Security Evaluators (*) affecting various ASUS routers has been
known for some time. The vulnerability enables an attacker to forge HTML
forms and execute actions on the behalf of the target user (admin),
enabling executing administrative functions. Another vulnerability allows
executing arbitrary commands as administrator (root). ASUS was notified of
these issues on March 29th 2013.

These vulnerabilities were not considered critical, likely because of the
seemingly strict prerequisites for the attack:

"- The victim must have an active web application session on their ASUS
- The victim must follow a link crafted by an attacker (e.g., by clicking
the link directly, or through some other mechanism such as redirection
from a malicious site).
- The victim must have the necessary permissions to render and execute
the forged HTTP."
(*) http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf

The two newly discovered vulnerabilities, described in more detail below,
enable exploiting the earlier vulnerabilities in an automated fashion. The
attack requires no interaction from the user, other than browsing to a
website that has been injected with JavaScript code crafted by the attacker.
The exploit could be embedded into various otherwise benign sites via e.g.
malicious advertisement banners or by exploiting persistent Cross-Site
Scripting vulnerabilities. The attacks could also be carried out with
phishing email campaigns.

The attack utilizes a reflected Cross-Site Scripting vulnerability on the
unauthenticated error page to bypass the same-origin policy protection.
Vulnerability number two described below is used to obtain the
administrator's password. The reflected JavaScript payload executes within
the context of the ASUS device and is able to utilize the CVE-2013-3093
CSRF vulnerability to perform actions on the behalf of the user (admin).
The exploit utilizes the "SystemCmd" arbitrary command execution feature
to allow remote administrative telnet connectivity from all addresses.

New vulnerabilities

1. Reflected Cross-Site Scripting (CWE-79)

There is a Cross-Site Scripting vulnerability on the router error page:

The error page is accessible without authentication. This vulnerability
enables the attacker to bypass same-origin policy restrictions enforced
by XMLHttpRequest.

2. Authentication bypass (CWE-592)

The router error page includes the
current administrative password in clear text.

For example if the administrative password is "Joshua", the page includes
the following dynamically generated JavaScript:

if('1' == '0' || 'Joshua' == 'admin')

The error page is accessible without authentication. This vulnerability
enables the attacker with same-origin rights, obtained by utilizing the
vulnerability above, to read the password by utilizing an XMLHttpRequest
call. The script can then perform actions as administrator by utilizing
further XMLHttpRequest calls.

Vulnerable devices

The vulnerabilities were discovered from an ASUS RT-N16 device, firmware
version By sampling a small set of ASUS firmware images
the following models were also found likely to be vulnerable:

ASUS RT-N10U, firmware
ASUS RT-N56U, firmware
ASUS DSL-N55U, firmware *
ASUS RT-AC66U, firmware *
ASUS RT-N15U, firmware
ASUS RT-N53, firmware

*) ASUS DSL-N55U and ASUS RT-AC66U did not appear vulnerable to the
authentication bypass issue. These devices are still vulnerable to the XSS
and if the default password 'admin' has not been changed, they are easily
exploitable as well.

This list is by no means comprehensive. It is likely that other devices are
vulnerable as well.

Vendor recommendations

1. Fix the Cross-Site Scripting vulnerabilities, at least from the
unauthenticated part of the web interface (error_page.htm)
2. Fix the admin password disclosure on error_page.htm
3. Fix the CSRF (CVE-2013-3093) issue by utilizing anti-CSRF protection

End user mitigation

1. Install the latest firmware update, version or later.


2. If no firmware update has been released, the end users can partially
mitigate the vulnerabilities by changing the "Router Login Name" via
the "Administration - System" menu to be something other than "admin".
Changing the router default network to something else than might also grant some limited protection.


A proof-of-concept exploit consisting of a small demo web page will be
released at a later date.


The vulnerabilities were discovered by Harry Sintonen / nSense Oy.

Previous work

The Cross-Site Request Forgery and command execution vulnerabilities
(CVE-2013-3093) were discovered by Jacob Holcomb / Independent Security


15.1.2014 discovered the vulnerabilities
16.1.2014 wrote a preliminary report and PoC
20.1.2014 attempted to send email to security@asus.com and secure@asus.com,
both addresses bounced.
20.1.2014 opened a ticket at vip.asus.com on how to report security
vulnerabilities on ASUS hw.
20.1.2014 emailed netadmin@asus.com.tw asking how to report security
vulnerabilities on ASUS hw.
20.1.2014 emailed CERT-FI asking for help contacting ASUS.
21.1.2014 CERT-FI was able to figure out ASUS security contact details.
21.1.2014 reported the security vulnerabilities to ASUS.
21.1.2014 reported the security vulnerabilities to CERT-FI vulncoord.
22.1.2014 got a response from representative of the vendor, report forwarded to
R&D for review. (ASUS CASEID=RPTM20140121202264-976)
27.1.2014 got a response from the vendor, CWE-592 is fixed in the latest firmware
version (for some devices?), CWE-79 is still being fixed.
08.2.2014 the vendor reported that the updated firmware will be released
during week 8.
13.2.2014 ASUS released firmware updates for RT-N16, RT-N10U, RT-AC66U and
13.2.2014 requested CVE IDs from MITRE.
19.2.2014 ASUS released a firmware update for RT-N56U.
21.2.2014 released the security advisory.
Login or Register to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By