A proof-of-concept security research tool demonstrating an information disclosure vulnerability in ASUS routers running vulnerable firmware versions.
AsusLeak is a proof-of-concept demonstrating CVE-2018-18287, an information disclosure vulnerability affecting certain ASUS router models. This vulnerability allows unauthenticated attackers to extract sensitive network information from vulnerable routers without authentication.
CVE-2018-18287 is an information disclosure vulnerability that affects ASUS routers running specific firmware versions. The vulnerability exists in the router's web interface and allows unauthorized access to sensitive network data.
The vulnerability is present in the main login page (Main_Login.asp) and additional pages of the router's web interface. These pages inadvertently expose:
- DHCP Lease Information: Complete list of devices connected to the network, including IP addresses and hostnames
- Network Time Information: Current time, date, and system uptime statistics
- Network Topology: Details about active network clients
This information is accessible without authentication, allowing any user with network access to the router's web interface to extract sensitive data about the network and connected devices.
The vulnerability enables attackers to:
- Map the internal network structure
- Identify connected devices by hostname
- Determine the router's uptime and infer reboot patterns
- Potentially use time information for geolocation inference
- Gather reconnaissance data for further attacks
For official vulnerability details, see: CVE-2018-18287 on MITRE
- Router Model: ASUS RT-AC58U
- Vendor: ASUS
- Vulnerable Firmware Version: 3.0.0.4.380_6516
Note: Other ASUS router models and firmware versions may also be affected. Users should verify their specific model and firmware version against vendor security advisories.
- Python 3.x
- Required Python packages:
requestsargparse(included in Python standard library)re(included in Python standard library)
- Clone the repository:
git clone https://github.com/syrex1013/AsusLeak.git
cd AsusLeak- Install dependencies:
pip install requestsRun the script by specifying the target router's IP address:
python AsusLeak.py -ip 192.168.1.1192.168.1.100 DESKTOP-PC01
192.168.1.101 LAPTOP-USER
192.168.1.102 SMARTPHONE-DEVICE
Time data:
Sun, 14 Oct 2018 12:44:06 +0200(317023 secs since boot)
-ip: Target router IP address (required)- Default router IP is typically
192.168.1.1or192.168.50.1
- Default router IP is typically
The tool exploits the information disclosure vulnerability through the following mechanism:
-
DHCP Leak Extraction:
- Sends an HTTP GET request to
http://[router-ip]/Main_Login.asp - Parses the JavaScript variable
dhcpLeaseInfofrom the response - Extracts and formats the list of connected devices with their IP addresses and hostnames
- Sends an HTTP GET request to
-
Time Information Extraction:
- Sends an HTTP GET request to
http://[router-ip]/update_clients.asp - Extracts the
current_timevalue from the response - Displays the router's current time, date, and uptime information
- Sends an HTTP GET request to
Both requests are made without any authentication, demonstrating the severity of the vulnerability.
- Authorized Testing Only: Use this tool only on networks and devices you own or have explicit written permission to test
- Legal Compliance: Unauthorized access to computer systems is illegal in many jurisdictions
- Responsible Disclosure: Report vulnerabilities through proper channels following responsible disclosure guidelines
- No Warranty: This software is provided "as-is" without any warranty
The authors and contributors are not responsible for misuse or damage caused by this tool.
- Update Firmware: Check for and install the latest firmware updates from ASUS
- Disable Remote Management: If not needed, disable remote access to the router's web interface
- Network Segmentation: Place the router's management interface on a separate, trusted network
- Monitor for Updates: Regularly check ASUS security advisories for your router model
- Implement network access controls to restrict access to router management interfaces
- Monitor for unauthorized access attempts
- Consider using VPNs or other secure access methods for router administration
- Replace vulnerable devices if patches are not available
Contributions are welcome! Please feel free to submit issues or pull requests for:
- Additional affected device detection
- Improved output formatting
- Documentation improvements
- Security enhancements
This project is licensed under the MIT License - see the LICENSE file for details.
This research was conducted to improve security awareness and help users protect their network infrastructure.
Ethical Use Notice: This tool is intended for security researchers, penetration testers, and network administrators to assess the security of systems they are authorized to test. Always obtain proper authorization before testing any system.