PT-2023-4970 · Asus · Asus Rt-Ax55
Published
2023-09-11
·
Updated
2025-10-31
·
CVE-2023-39780
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
ASUS RT-AX55 version 3.0.0.4.386.51598
Description
The issue is related to an authenticated command injection vulnerability. This vulnerability allows a remote attacker to execute arbitrary system commands. Over 9,000 ASUS routers have been compromised by a botnet named "AyySSHush," which exploits this vulnerability to add a persistent SSH backdoor, allowing continued access even after firmware updates. The attackers use a combination of brute-force login attempts and authentication bypass methods, including the exploitation of the command injection vulnerability, to gain access to the routers. They then enable SSH access on a non-standard port (TCP/53282) and install a malicious public key for remote access. The backdoor is stored in the router's NVRAM, ensuring its persistence even after firmware updates or system reboots. The attackers also disable logging to avoid detection.
Recommendations
To resolve the issue for ASUS RT-AX55 version 3.0.0.4.386.51598, update the firmware to the latest version. Additionally, check for and remove any unauthorized SSH keys, and block the IP addresses 101.99.91.151, 101.99.94.173, 79.141.163.179, and 111.90.146.237. If necessary, reset the device to its factory settings and reconfigure it. As a temporary workaround, consider disabling SSH access on the non-standard port (TCP/53282) until a patch is available. Restrict access to the vulnerable
authorized keys file to minimize the risk of exploitation. Avoid using the SSH protocol until the issue is resolved.Exploit
Fix
Command Injection
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2023-05508
CVE-2023-39780
Affected Products
Asus Rt-Ax55
References · 45
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/6/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/4/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/3/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/2/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/5/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://github.com/D2y6p/CVE/blob/main/asus/CVE-2023-39780/1/EN.md⭐ 22 🔗 5 · Exploit
- 🔥 https://greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers · Exploit
- https://asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55 · Security Note
- https://asus.com/content/asus-product-security-advisory · Security Note
- https://bdu.fstec.ru/vul/2023-05508 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-39780 · Security Note
- https://cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv · Note
- https://twitter.com/the_yellow_fall/status/1927908152327967181 · Twitter Post
- https://t.me/purp_sec/698 · Telegram Post
- https://twitter.com/ethicalhack3r/status/1929605970486775936 · Twitter Post