CVE-2023-39780: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS RT-AX55
On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.
AI Analysis
Technical Summary
CVE-2023-39780 is an OS command injection vulnerability identified in the ASUS RT-AX55 router firmware version 3.0.0.4.386.51598. The flaw exists in the handling of the qos_bw_rulelist parameter within the /start_apply.htm endpoint. An authenticated attacker can inject malicious OS commands through this parameter due to improper neutralization of special elements, classified under CWE-78. This vulnerability allows execution of arbitrary commands with the privileges of the web server process, potentially leading to full device compromise. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means attackers can steal sensitive data, alter configurations, or disrupt device operation. While no public exploits are currently known, the vulnerability is critical due to the widespread use of ASUS routers in home and enterprise environments. The vulnerability is related to other token and authentication module issues (CVE-2023-41345 to CVE-2023-41348), indicating a broader security concern in the firmware. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, exploitation of CVE-2023-39780 could lead to severe consequences including unauthorized access to network infrastructure, interception or manipulation of network traffic, and potential pivoting to internal networks. Given the router’s role as a gateway device, attackers could disrupt business operations, exfiltrate sensitive data, or deploy further malware. The high impact on confidentiality, integrity, and availability means critical services relying on these routers could be compromised or rendered unavailable. This is particularly concerning for sectors such as finance, healthcare, and government agencies where network reliability and data protection are paramount. Additionally, the vulnerability could be leveraged for large-scale attacks if exploited in botnets or ransomware campaigns. The requirement for authentication limits exposure but does not eliminate risk, especially if credentials are weak or compromised. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat landscape could evolve rapidly.
Mitigation Recommendations
1. Immediately restrict administrative access to the ASUS RT-AX55 routers by limiting management interfaces to trusted IP addresses and enforcing strong authentication mechanisms. 2. Monitor network traffic and device logs for unusual commands or configuration changes related to the qos_bw_rulelist parameter or /start_apply.htm endpoint. 3. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 4. Regularly audit and update router firmware; although no patch was available at publication, check ASUS advisories frequently for updates addressing this vulnerability. 5. Employ multi-factor authentication for router management interfaces to reduce risk from compromised credentials. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts targeting this vulnerability. 7. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 8. Consider temporary replacement or additional protective controls for affected devices in high-risk environments until patches are available.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Sweden
CVE-2023-39780: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS RT-AX55
Description
On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348.
AI-Powered Analysis
Technical Analysis
CVE-2023-39780 is an OS command injection vulnerability identified in the ASUS RT-AX55 router firmware version 3.0.0.4.386.51598. The flaw exists in the handling of the qos_bw_rulelist parameter within the /start_apply.htm endpoint. An authenticated attacker can inject malicious OS commands through this parameter due to improper neutralization of special elements, classified under CWE-78. This vulnerability allows execution of arbitrary commands with the privileges of the web server process, potentially leading to full device compromise. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means attackers can steal sensitive data, alter configurations, or disrupt device operation. While no public exploits are currently known, the vulnerability is critical due to the widespread use of ASUS routers in home and enterprise environments. The vulnerability is related to other token and authentication module issues (CVE-2023-41345 to CVE-2023-41348), indicating a broader security concern in the firmware. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, exploitation of CVE-2023-39780 could lead to severe consequences including unauthorized access to network infrastructure, interception or manipulation of network traffic, and potential pivoting to internal networks. Given the router’s role as a gateway device, attackers could disrupt business operations, exfiltrate sensitive data, or deploy further malware. The high impact on confidentiality, integrity, and availability means critical services relying on these routers could be compromised or rendered unavailable. This is particularly concerning for sectors such as finance, healthcare, and government agencies where network reliability and data protection are paramount. Additionally, the vulnerability could be leveraged for large-scale attacks if exploited in botnets or ransomware campaigns. The requirement for authentication limits exposure but does not eliminate risk, especially if credentials are weak or compromised. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat landscape could evolve rapidly.
Mitigation Recommendations
1. Immediately restrict administrative access to the ASUS RT-AX55 routers by limiting management interfaces to trusted IP addresses and enforcing strong authentication mechanisms. 2. Monitor network traffic and device logs for unusual commands or configuration changes related to the qos_bw_rulelist parameter or /start_apply.htm endpoint. 3. Implement network segmentation to isolate vulnerable routers from critical infrastructure and sensitive data environments. 4. Regularly audit and update router firmware; although no patch was available at publication, check ASUS advisories frequently for updates addressing this vulnerability. 5. Employ multi-factor authentication for router management interfaces to reduce risk from compromised credentials. 6. Use intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts targeting this vulnerability. 7. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 8. Consider temporary replacement or additional protective controls for affected devices in high-risk environments until patches are available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-08-07T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebda0
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 10/21/2025, 9:05:01 PM
Last updated: 11/26/2025, 4:27:19 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66022: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in factionsecurity faction
CriticalCVE-2025-66269: CWE-428 Unquoted Search Path or Element in MegaTec Taiwan UPSilon2000V6.0
HighCVE-2025-66266: CWE-269 Improper Privilege Management in MegaTec Taiwan UPSilon2000V6.0
CriticalCVE-2025-66021: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in OWASP java-html-sanitizer
HighCVE-2025-66020: CWE-1333: Inefficient Regular Expression Complexity in open-circle valibot
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.