ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

Listen to this Post

ASUS has confirmed a critical vulnerability in its AiCloud routers, urging users to update their firmware immediately. The flaw could expose sensitive data and allow unauthorized access to the device. Given the product’s name (“AiCloud”), security experts humorously pointed out the irony, as cloud-based AI services are often prime targets for cyberattacks.

Read more: thehackernews.com

You Should Know:

1. Check Your ASUS Router Firmware Version

To verify if your router is affected, log in to the admin panel (usually `http://192.168.1.1`) and navigate to:
– Firmware Update section under Administration.
– Compare your current version with the latest one listed on ASUS’s official support page.

2. Update Firmware Manually (Linux/Windows Commands)

If automatic updates fail, download the latest firmware from ASUS’s website and flash it manually.

For Linux Users:

wget https://www.asus.com/support/download/firmware -O asus_firmware.zip
unzip asus_firmware.zip
 Upload via admin panel or use:
curl -F "[email protected]" http://192.168.1.1/update.cgi

For Windows Users (PowerShell):

Invoke-WebRequest -Uri "https://www.asus.com/support/download/firmware" -OutFile "asus_firmware.zip"
Expand-Archive -Path "asus_firmware.zip" -DestinationPath .\
 Upload via web interface

3. Mitigate Risks Until Patch is Applied

  • Disable remote management:
    iptables -A INPUT -p tcp --dport 8080 -j DROP  Blocks AiCloud port
    
  • Enable WPA3 encryption:
    nvram set wl0_crypto=aes  For older ASUSWRT
    nvram commit
    

4. Verify if Your Router Was Compromised

Check logs for suspicious activity:

cat /var/log/messages | grep "unauthorized"

Or scan for open ports (replace `192.168.1.1` with your router IP):

nmap -p 80,443,8080 192.168.1.1

What Undercode Say:

The ASUS AiCloud flaw underscores the risks of poorly secured IoT devices. Always:
– Disable unused services (AiCloud, FTP, Samba).
– Monitor firmware updates using RSS feeds or scripts:

watch -n 30 'curl -s https://www.asus.com/support | grep "AiCloud firmware"'

– Enforce firewall rules to block external access:

ufw deny from any to 192.168.1.1 port 8443  AiCloud default port

– Use VLANs to isolate IoT devices:

vconfig add eth0 100  Creates VLAN 100
ifconfig eth0.100 up

Expected Output:

A secure, up-to-date router with minimized attack surface. Regularly audit connected devices with:

arp-scan --localnet

Note: Replace placeholder URLs with actual ASUS firmware links. Always test commands in a lab first.

Expected Output:

A hardened ASUS router with no exposed AiCloud services and active logging for intrusion detection.

References:

Reported By: Alexandre Blanc – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image