Trustwave SpiderLabs Security Advisory TWSL2020-004: Multiple Vulnerabilities in ASUS RT-AC1900P router Published: 07/10/20 Version: 1.0 Vendor: AsusTek Computer Inc. (www.asus.com) Product: ASUS RT-AC1900P router Version affected: 3.0.0.4.385_10000-gd8ccd3c Product description: Dual Band Gigabit Wireless AC Router with AiMesh Support. Finding 1: Firmware update accepts forged server certificates. Credit: Martin Rakhmanov of Trustwave CVE: CVE-2020-15498 The router accepts forged server certificates for the firmware update. As a result, MITM attack is trivial when the device is connected to a malicious network. The culprit is the --no-check-certificate option passed to wget tool used to download firmware update files on the router. Finding 2: Firmware release notes dialog in the router management web interface is susceptible to cross site scripting. Credit: Martin Rakhmanov of Trustwave CVE: CVE-2020-15499 Given that the device accepts forged certificates, an attacker can trick the router to display a message that a new firmware is available when the admin user open the Firmware Upgrade page. Furthermore, an attacker can then craft malicious file containing release notes for the "new" firmware that will contain arbitrary javascript. Due to cross site scripting the malicious javascript will be executed when an unsuspecting admin user clicks the release notes link on the Firmware Upgrade page. Example contents for the malicious release notes file: