Improper Input Insertion Vulnerability in AiCloud for ASUS Routers
CVE-2024-12912

7.2HIGH

Key Information:

Vendor
Asus
Status
Vendor
CVE Published:
2 January 2025

What is CVE-2024-12912?

CVE-2024-12912 is a critical vulnerability identified in the AiCloud service of specific ASUS router models. This vulnerability stems from improper input insertion, which could allow unauthorized users to execute arbitrary commands on affected devices. The potential exploitation of this flaw presents significant risks to organizations relying on these routers for their network operations, as it could lead to unauthorized access, data breaches, and compromised network integrity.

Technical Details

The vulnerability occurs within the AiCloud software component of particular ASUS routers. It is characterized by a failure to properly validate user inputs, enabling attackers to manipulate commands executed by the router. This flaw could be exploited remotely, allowing threat actors to gain elevated privileges and execute malicious commands on the device, leading to potential control over the router itself or the network it manages.

Potential Impact of CVE-2024-12912

  1. Arbitrary Command Execution: The vulnerability allows attackers to execute arbitrary commands on the affected routers, leading to unauthorized control and manipulation of device settings.

  2. Network Integrity Compromise: With successful exploitation, malicious actors could gain access to entire networks connected to the router, thereby posing additional risks to sensitive data and critical infrastructure.

  3. Increased Attack Surface: The existence of this vulnerability can elevate the risk of further attacks on the network, as compromised routers can be leveraged as entry points for advanced persistent threats and other malicious activities.

Affected Version(s)

Router 3.0.0.4_382 series

Router 3.0.0.4_386 series

Router 3.0.0.4_388 series

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.