If you read PCWorld, you probably know how important it is to regularly update your computer to fix security issues. And you probably know that the same is true for your phone and even things like PlayStation. But don't forget that your network equipment is essentially just a group of computers. And thanks to Asus for the reminder, as it patches DSL routers to close security vulnerabilities.
In particular, Asus has released a firmware update for three models of relatively old DSL routers with a combined Wi-Fi function: DSL-AC51, DSL-N16 and DSL-AC750. Released in 2015 and 2017, at least from what I can tell from a quick search, these are fairly basic models with no super advanced features even for that time. But if you have one at home, you will want to fix this firmware immediately. They are subject to an authentication bypass vulnerability, as noted in the multi-vendor entry. Common Vulnerabilities and Exposures (CVE) Database and noticed Computer beeping.
Asus direct support pages for DSL-AC51, DSL-N16And DSL-AC750 are they in the links I just posted in this sentence. The firmware can be downloaded and applied through the web interface for most routers if it is not already done automatically, or applied manually by downloading the file and then uploading it to the GUI over the local network.
What if your router is affected by this particular vulnerability, but it is down and not patched? Then Asus offers that you will disable almost all advanced features, including remote WAN access, port forwarding, DNS, VPN server, DMZ, port triggering and FTP. What specific older unsupported DSL routers does this apply to? Don't ask me because Asus doesn't say anything.
I don't have DSL, but it occurred to me that I don't know the make and model of my cable modem or Wi-Fi router. I think I'll dig through the rat's nest behind the printer to write them down somewhere more accessible.






