Vulnerability Note VU#191750

ASUS Wireless Router products contain a static DNS entry

Original Release date: 13 Jan 2014 | Last revised: 13 Jan 2014

Overview

The ASUS WL-330NUL Pocket Wifi router and possibly other products contain a static DNS entry to the device's configuration pages.

Description

The ASUS WL-330NUL Pocket Wifi router and possibly other products contain static DNS entries to the device's configuration pages. The documentation advises users to configure the device via the provided URL of www.asusnetwork .net. The device has a statically configured DNS entry for this site that directs the browser to the IP address of 192.168.1.1. If a user is not connected to an ASUS device, accessing this website in lieu of entering their router's IP address may lead the victim to a malicious site that may contain malware. At the time of publication, asusnetwork .net redirects to a site serving malware.

Impact

The user may be redirected to an untrusted page that contains malware which can potentially compromise their machine.

Solution

Apply an Update

Asus has provided a fix for this issue. Users are advised to go to the Asus Support Page and download updated firmware for their device.

Use the static IP of your router

Always use 192.168.1.1 in your browser instead of the provided URL.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AsusTek Computer Inc.Affected10 Oct 201309 Jan 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
Temporal 3.7 E:U/RL:OF/RC:C
Environmental 0.9 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to the reporter who wishes to remain anonymous.

This document was written by Adam Rauf.

Other Information

  • CVE IDs: Unknown
  • Date Public: 25 Nov 2013
  • Date First Published: 13 Jan 2014
  • Date Last Updated: 13 Jan 2014
  • Document Revision: 34

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.