Researcher discovered an RCE vulnerability on ASUS's RMA portal by bypassing front-end file upload restrictions, uploading an ASP shell to the predictable /uploads directory on IIS 8.5. The vulnerability was patched after disclosure, though the researcher experienced poor communication from ASUS and had to persist to be added to their Hall of Fame.
Reflected XSS vulnerability discovered in ASUS's press subdomain (press.asus.com/search) via unsanitized search parameter, exploited with a basic script injection payload and resolved within 13 days of responsible disclosure.
Researchers discovered KadNap, a botnet of 14,000+ Asus routers using Kademlia-based peer-to-peer distributed hash tables for decentralized command-and-control, making it highly resistant to traditional takedown methods while serving as infrastructure for the Doppelganger anonymous proxy service.
KadNap, a takedown-resistant botnet infecting ~14,000 routers (primarily Asus models), uses a Kademlia-based peer-to-peer architecture with distributed hash tables for command-and-control evasion. The compromised devices are conscripted into the Doppelganger proxy service to anonymously tunnel cybercriminal traffic.