Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi

0
High
VulnerabilityCVE-2024-0401cvecve-2024-0401cwe-78
Published: Mon May 20 2024 (05/20/2024, 16:55:18 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: ExpertWiFi

Description

ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000.

AI-Powered Analysis

AILast updated: 11/22/2025, 12:57:07 UTC

Technical Analysis

CVE-2024-0401 is an OS command injection vulnerability classified under CWE-78, affecting ASUS routers that support custom OpenVPN profiles, notably the ExpertWiFi and several RT-AX and RT-AC series models. The vulnerability arises from improper neutralization of special elements in the OpenVPN profile upload functionality, allowing an authenticated remote attacker to execute arbitrary operating system commands. The attack vector requires the attacker to authenticate to the router’s management interface and upload a maliciously crafted OVPN profile. Upon processing this profile, the router executes injected commands with the privileges of the router’s operating system, potentially leading to full device compromise. The vulnerability impacts confidentiality, integrity, and availability, as attackers could exfiltrate sensitive data, alter router configurations, or disrupt network services. The CVSS v3.1 score of 7.2 reflects a high severity with network attack vector, low attack complexity, and high impact on all security properties. No public exploits or patches are currently available, increasing the urgency for mitigation. The affected router models are widely deployed in both consumer and enterprise environments, making this vulnerability a significant threat to network security.

Potential Impact

For European organizations, exploitation of CVE-2024-0401 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of VPN traffic, and persistent compromise of network infrastructure. Given the routers’ role as gateways, attackers could pivot to other internal systems, exfiltrate sensitive data, or disrupt business operations. The vulnerability’s ability to impact confidentiality, integrity, and availability simultaneously elevates the risk profile. Organizations relying on these ASUS routers for secure remote access or site-to-site VPNs are particularly vulnerable. Critical sectors such as finance, healthcare, government, and telecommunications could face operational disruptions and data breaches. The requirement for authentication limits exploitation to insiders or attackers with stolen credentials, but this does not eliminate risk, especially in environments with weak access controls or credential management. The absence of known exploits in the wild provides a window for proactive defense but also means attackers may be developing exploits.

Mitigation Recommendations

European organizations should immediately audit their network environments to identify the presence of affected ASUS router models. Restrict management interface access to trusted networks and enforce strong authentication mechanisms, including multi-factor authentication where possible. Disable or tightly control the ability to upload custom OpenVPN profiles, implementing strict input validation and sanitization to prevent injection of malicious commands. Monitor router logs for suspicious profile upload activities and anomalous command executions. Maintain network segmentation to limit the impact of a compromised router. Since no official patches are currently available, consider temporary mitigations such as disabling OpenVPN profile uploads or replacing vulnerable devices with alternative hardware. Engage with ASUS support channels to obtain updates on patch releases and apply them promptly once available. Additionally, implement network intrusion detection systems tuned to detect unusual router behavior or command injection attempts. Regularly update firmware and software to minimize exposure to known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2024-01-10T15:27:41.121Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6921b03d8e780dcd644facaf

Added to database: 11/22/2025, 12:44:45 PM

Last enriched: 11/22/2025, 12:57:07 PM

Last updated: 11/22/2025, 1:57:40 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats