Asus responds to concerns over 9,000+ routers compromised by botnet — firmware updates and factory reset can purge routers of persistent backdoor

Router
(Image credit: Shutterstock)

Asus has issued multiple statements regarding a highly publicized botnet attack infecting over 9,000 routers to date. Per our previous reporting, the "AyySSHush" botnet has infected its hosts through a mix of brute-force attacks and authentication bypasses, and hides its backdoor in non-volatile memory, thus attempting to hide from firmware updates and refreshes.

In an official statement regarding the insecurity, Asus told Tom's Hardware that the vulnerabilities can be avoided for those yet uninfected, and fixed for those routers that have been compromised. The hostile agents utilize a known command injection flaw, CVE-2023-39780, to enable SSH access on a custom port (TCP/53282) and insert an attacker-controlled public key for remote access.

TOPICS
Sunny Grimm
Contributing Writer

Sunny Grimm is a contributing writer for Tom's Hardware. He has been building and breaking computers since 2017, serving as the resident youngster at Tom's. From APUs to RGB, Sunny has a handle on all the latest tech news.

  • wakuwaku
    Can tom's AI at least write up a proper security article? When putting a link to a security advisory page, PUT A LINK TO THE SECURITY ADVISORY PAGE. Don't put a "link" to your useless collection of security articles that link back to themselves instead of helping people to resolve their security issues. You might as well not write such articles.
    Reply