Maintaining software updates is essential for devices like personal computers and smartphones to address potential security risks, and the same principle applies to gaming consoles. Often overlooked, however, are networking devices, which essentially function as specialized computers. Asus has highlighted this need by releasing an update to resolve exploitable weaknesses in certain DSL routers that also support Wi-Fi.
The update targets three outdated models: the DSL-AC51, DSL-N16, and DSL-AC750. These units, introduced around 2015 and 2017 based on available records, offer basic capabilities without cutting-edge options even by contemporary standards. Owners of these devices should prioritize installing the new firmware immediately, as they are vulnerable to a flaw allowing authentication circumvention. This issue has been documented in the Common Vulnerabilities and Exposures database and was first reported by Bleeping Computer.
Official support resources for the DSL-AC51, DSL-N16, and DSL-AC750 are accessible through Asus's website. Users can obtain the firmware files and install them using the router's web interface, either automatically if supported or by manually downloading and uploading the file locally.
For routers affected by this flaw but no longer receiving updates due to end-of-life status, Asus recommends deactivating various advanced settings such as remote access from the wide area network, port forwarding, domain name system reconfiguration, virtual private network hosting, demilitarized zone setup, port triggering, and file transfer protocol access. The company has not disclosed the exact list of legacy, unsupported DSL models impacted by these risks.
Although I do not use DSL service myself, it struck me that I am unfamiliar with the precise manufacturer and version of my cable modem and wireless router. I plan to investigate the tangled cables near my printer to note this information in a more convenient location.