ASUS RT-AC52U Windows 11 64-bit Drivers
Utilities
ASUS Firmware Restoration version 2.1.0.3 OS support: Windows XP/7/8/8.1/10/11
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.
NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download
Firmware
ASUS RT-AC52U Firmware version 3.0.0.4.380.8497 Fixed a DDoS vulnerability
Please unzip the firmware file first then check the MD5 code.
MD5: ea7270d51e76d8063538325ad909d184 Download
ASUS RT-AC52U Firmware version 3.0.0.4.380.8457 Security fixes:
- Fixed Reflected XSS vulnerability.
- Fixed CSRF vulnerability.
- Fixed command injection vulnerability.
- Fixed stack buffer overflow vulnerability.
Thanks for Rick Ramgattie contribution.
Please unzip the firmware file first then check the MD5 code.
MD5:6db7559fc88838f5f169915143ec6a6 Download
ASUS RT-AC52U Firmware version 3.0.0.4.380.8284 - Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighttpd.
- Fixed AiCloud login bugs.
- Modified Quick Internet Setup wizard process.
Please unzip the firmware file first then check the MD5 code.
MD5: 4bd7bb010e85b3b04b39ee7be5b12a8a Download
ASUS RT-AC52U Firmware version 3.0.0.4.380.8241 Fixed KRACK vulnerability
Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
Fixed CVE-2017-14492: DHCP - heap based overflow
Fixed CVE-2017-14493: DHCP - stack based overflow
Fixed CVE-2017-14494: DHCP - info leak
Fixed CVE-2017-14495: DNS - OOM DoS
Fixed CVE-2017-14496: DNS - DoS Integer underflow
Fixed CVE-2017-13704: Bug collision
Fixed AiCloud 2.0 Reflected XSS Vulnerability. Thanks to Guy Arazi and Niv Levi contribution.
Thanks to Guy Arazi for following vulnerabilities.
- AiCloud 2.0 Stored XSS Share link manager.
- AiCloud 2.0 Reflected XSS - "share a link"
- Download Master HTTP service DoS vulnerability.
- Download Master Reflected XSS Main login.
- Fixed Smart Sync Stored XSS vulnerabilities.
Please unzip the firmware file first then check the MD5 code.
MD5: 4c8d56468cd36bea0be20e22a0f1bc9d Download