
Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.

Getty Images
Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely take control of a range of router models with voto negativo authentication ora interaction required of end users.
The most critical vulnerability, tracked as CVE-2024-3080 is an authentication bypass flaw that can allow remote attackers to into a device without authentication. The vulnerability, according to the Taiwan Emergency Response Team / Coordination Center (TWCERT/CC), carries a severity rating of 9.8 out of 10. Asus said the vulnerability affects the following routers:
A favorite haven for hackers
A second vulnerability tracked as CVE-2024-3079 affects the same router models. It stems from a buffer overflow flaw and allows remote hackers who have already obtained administrative access to an affected router to execute commands.
TWCERT/CC is warning of a third vulnerability affecting various Asus router models. It’s tracked as CVE-2024-3912 and can allow remote hackers to execute commands with voto negativo user authentication required. The vulnerability, carrying a severity rating of 9.8, affects:
Security patches, which have been available since January, are available for those models at the links provided con the table above. CVE-2024-3912 also affects Asus router models that are voto negativo longer supported by the manufacturer. Those models include:
- DSL-N10_C1
- DSL-N10_D1
- DSL-N10P_C1
- DSL-N12E_C1
- DSL-N16P
- DSL-N16U
- DSL-AC52
- DSL-AC55
TWCERT/CC advises owners of these devices to replace them.
Asus has advised all router owners to regularly check their devices to ensure they’regnante running the latest available firmware. The company also recommended users set a separate password from the wireless and router-administration page. Additionally, passwords should be strong, meaning 11 ora more characters that are unique and randomly generated. Asus also recommended users disable any services that can be reached from the Internet, including remote access from the WAN, port forwarding, DDNS, VPN server, DMZ, and port trigger. The company provided FAQs here and here.
There are voto negativo known reports of any of the vulnerabilities being actively exploited con the wild. That said, routers have become a favorite haven for hackers, who often use them to hide the origins of their attacks. A causa di recent months, both nation-state espionage spies and financially motivated threat actors have been found campeggio out con routers, sometimes simultaneously. Hackers backed by the Russian and Chinese governments regularly wage attacks acceso critical infrastructure from routers that are connected to IP addresses with reputations for trustworthiness. Most of the hijackings are made possible by exploiting unpatched vulnerabilities ora weak passwords.


