Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-39780: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS RT-AX55

0
High
VulnerabilityCVE-2023-39780cvecve-2023-39780cwe-78
Published: Mon Sep 11 2023 (09/11/2023, 00:00:00 UTC)
Source: CVE
Vendor/Project: ASUS
Product: RT-AX55

Description

On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.

AI-Powered Analysis

AILast updated: 10/21/2025, 21:05:01 UTC

Technical Analysis

CVE-2023-39780 is an OS command injection vulnerability identified in the ASUS RT-AX55 router firmware version 3.0.0.4.386.51598. The flaw exists in the handling of the qos_bw_rulelist parameter within the /start_apply.htm endpoint. An authenticated attacker can inject malicious OS commands through this parameter due to improper neutralization of special elements, classified under CWE-78. This vulnerability allows execution of arbitrary commands with the privileges of the web server process, potentially leading to full device compromise. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means attackers can steal sensitive data, alter configurations, or disrupt device operation. While no public exploits are currently known, the vulnerability is critical due to the widespread use of ASUS routers in home and enterprise environments. The vulnerability is related to other token and authentication module issues (CVE-2023-41345 to CVE-2023-41348), indicating a broader security concern in the firmware. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, exploitation of CVE-2023-39780 could lead to severe consequences including unauthorized access to network infrastructure, interception or manipulation of network traffic, and potential pivoting to internal networks. Given the router’s role as a gateway device, attackers could disrupt business operations, exfiltrate sensitive data, or deploy further malware. The high impact on confidentiality, integrity, and availability means critical services relying on these routers could be compromised or rendered unavailable. This is particularly concerning for sectors such as finance, healthcare, and government agencies where network reliability and data protection are paramount. Additionally, the vulnerability could be leveraged for large-scale attacks if exploited in botnets or ransomware campaigns. The requirement for authentication limits exposure but does not eliminate risk, especially if credentials are weak or compromised. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat landscape could evolve rapidly.

Mitigation Recommendations

1. Immediately restrict administrative access to the ASUS RT-AX55 routers by limiting management interfaces to trusted IP addresses and enforcing strong authentication mechanisms. 2. Monitor network traffic and device logs for unusual commands or configuration changes related to the qos_bw_rulelist parameter or /start_apply.htm endpoint. 3. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 4. Regularly audit and update router firmware; although no patch was available at publication, check ASUS advisories frequently for updates addressing this vulnerability. 5. Employ multi-factor authentication for router management interfaces to reduce risk from compromised credentials. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts targeting this vulnerability. 7. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 8. Consider temporary replacement or additional protective controls for affected devices in high-risk environments until patches are available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-08-07T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebda0

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 10/21/2025, 9:05:01 PM

Last updated: 11/26/2025, 4:27:19 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats