Trustwave SpiderLabs Security Advisory TWSL2020-004:
Multiple Vulnerabilities in ASUS RT-AC1900P router
Published: 07/10/20
Version: 1.0
Vendor: AsusTek Computer Inc. (www.asus.com)
Product: ASUS RT-AC1900P router
Version affected: 3.0.0.4.385_10000-gd8ccd3c
Product description:
Dual Band Gigabit Wireless AC Router with AiMesh Support.
Finding 1: Firmware update accepts forged server certificates.
Credit: Martin Rakhmanov of Trustwave
CVE: CVE-2020-15498
The router accepts forged server certificates for the firmware update. As a
result, MITM attack is trivial when the device is connected to a malicious
network. The culprit is the --no-check-certificate option passed to wget tool
used to download firmware update files on the router.
Finding 2: Firmware release notes dialog in the router management web interface is susceptible to cross site scripting.
Credit: Martin Rakhmanov of Trustwave
CVE: CVE-2020-15499
Given that the device accepts forged certificates, an attacker can trick the
router to display a message that a new firmware is available when the admin user
open the Firmware Upgrade page. Furthermore, an attacker can then craft
malicious file containing release notes for the "new" firmware that will contain
arbitrary javascript. Due to cross site scripting the malicious javascript will
be executed when an unsuspecting admin user clicks the release notes link on the
Firmware Upgrade page.
Example contents for the malicious release notes file: