Skip to main content

CVE-2023-39780: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS RT-AX55

High
VulnerabilityCVE-2023-39780cvecve-2023-39780cwe-78
Published: Mon Sep 11 2023 (09/11/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: ASUS
Product: RT-AX55

Description

On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.

AI-Powered Analysis

AILast updated: 07/10/2025, 18:01:21 UTC

Technical Analysis

CVE-2023-39780 is a high-severity OS command injection vulnerability affecting ASUS RT-AX55 routers running firmware version 3.0.0.4.386.51598. The vulnerability arises from improper neutralization of special elements in the 'qos_bw_rulelist' parameter of the /start_apply.htm endpoint, which is accessible to authenticated users. This flaw allows an attacker with valid credentials to inject arbitrary operating system commands, potentially leading to full compromise of the device. The vulnerability is categorized under CWE-78, indicating that the input is not properly sanitized before being passed to OS command execution functions. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring privileges (authenticated access) but no user interaction. Although no known exploits are reported in the wild yet, the presence of similar token-related vulnerabilities (CVE-2023-41345 through CVE-2023-41348) suggests a pattern of security weaknesses in the firmware. Successful exploitation could allow attackers to execute arbitrary commands, manipulate router configurations, intercept or redirect network traffic, or disrupt network availability. This vulnerability is particularly critical because routers are central to network security and traffic management, and compromise could enable lateral movement or persistent footholds within organizational networks.

Potential Impact

For European organizations, exploitation of this vulnerability could have severe consequences. Compromise of ASUS RT-AX55 routers could lead to interception or manipulation of sensitive data traversing the network, undermining confidentiality. Integrity of network configurations and traffic could be compromised, enabling attackers to redirect traffic to malicious endpoints or disable security controls. Availability could be impacted by denial-of-service conditions caused by malicious commands. Given the widespread use of ASUS routers in small to medium enterprises and home office environments across Europe, attackers could leverage this vulnerability to gain persistent access to corporate or personal networks. This is especially concerning for sectors with stringent data protection requirements such as finance, healthcare, and government institutions. Additionally, the ability to execute OS commands could facilitate deployment of malware, ransomware, or participation in botnets, amplifying the threat landscape. The requirement for authentication limits exposure but does not eliminate risk, as credential theft or weak password policies could enable attackers to exploit this flaw.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately verify if their ASUS RT-AX55 devices are running the affected firmware version 3.0.0.4.386.51598 and prioritize upgrading to a patched firmware version once released by ASUS. 2) Enforce strong authentication mechanisms on router management interfaces, including complex passwords and, if supported, multi-factor authentication to reduce risk of credential compromise. 3) Restrict management interface access to trusted networks or via VPN to minimize exposure to potential attackers. 4) Monitor router logs and network traffic for unusual activities indicative of command injection attempts or unauthorized configuration changes. 5) Segment network infrastructure to limit the impact of a compromised router on critical systems. 6) Disable or restrict QoS configuration interfaces if not required, reducing the attack surface. 7) Implement regular vulnerability scanning and firmware inventory to promptly identify vulnerable devices. 8) Educate IT staff and users about the risks of credential theft and the importance of timely patching. These steps go beyond generic advice by focusing on access control hardening, monitoring, and network segmentation specific to this vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-08-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebda0

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/10/2025, 6:01:21 PM

Last updated: 8/8/2025, 3:54:16 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats