ASUS RT-AC52U B1 Windows 10 64-bit Drivers

Utilities

ASUS Firmware Restoration version 2.1.0.3 OS support: Windows XP/7/8/8.1/10/11
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.

NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download

ASUS Device Discovery version 1.4.8.2 You can use the device discovery tool to find the IP address of wireless router.


OS Support: Windows XP/7/8/8.1/10 Download

ASUS Firmware Restoration version 2.1.0.2 OS support: Windows XP/7/8/8.1/10
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.

NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download

ASUS Device Discovery version 1.4.8.0 You can use the device discovery tool to find the IP address of wireless router.
OS support : Win XP, Win 7, Win8, Win10 Download

Firmware

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10931 - Fixed CVE-2018-20334
- Fixed CVE-2018-20336
- Fixed null pointer issue.
- Fixed DDoS vulnerability.
- Fixed command injection vulnerability.
- Fixed buffer overflow vulnerability.
- Updated OTA function.

Please unzip the firmware file first and then check the MD5 code.
MD5: 6e92a1ad8eb130b7569ab3c5a41eced0 Download

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10875 - Fixed a DDoS vulnerability.
- Fixed USB 3G/LTE dongle connection bugs.



Please unzip the firmware file first then check the MD5 code.
MD5: 2b6024d46296c7bc6bc76fc2d6b02d68 Download

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10760 Security fixes:
- Fixed Reflected XSS vulnerability.
- Fixed CSRF vulnerability.
- Fixed command injection vulnerability.
- Fixed stack buffer overflow vulnerability.
Thanks for Rick Ramgattie contribution.

Please unzip the firmware file first then check the MD5 code.
MD5:6a0f0ce9fc0241d4a69f6d9d38b1f8f5 Download

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10528 - Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighttpd.
- Modified Quick Internet Setup wizard process.
- Fixed AiCloud bugs.


Please unzip the firmware file first then check the MD5 code.
MD5: d1ef2b72afcc1b8485d3ca72efd02748 Download

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10446 -Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
-Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
-Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
-Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program

-Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
-Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
-Fixed CVE-2017-14492: DHCP - heap based overflow
-Fixed CVE-2017-14493: DHCP - stack based overflow
-Fixed CVE-2017-14494: DHCP - info leak
-Fixed CVE-2017-14495: DNS - OOM DoS
-Fixed CVE-2017-14496: DNS - DoS Integer underflow
-Fixed CVE-2017-13704: Bug collision
-Fixed AiCloud 2.0 Reflected XSS Vulnerability. Thanks to Guy Arazi and Niv Levi contribution.
Thanks to Guy Arazi for following vulnerabilities.

- AiCloud 2.0 Stored XSS Share link manager.
- AiCloud 2.0 Reflected XSS - "share a link"
- Download Master HTTP service DoS vulnerability.
- Download Master Reflected XSS Main login.
-Fixed Smart Sync Stored XSS vulnerabilities.

Please unzip the firmware file first then check the MD5 code.
MD5:ae186ddcc230ddb7a39a7e5b065ac69f Download

ASUS RT-AC52U B1 Firmware version 3.0.0.4.380.10367 Security:
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (P3 Patch)

Add:
- KR language support
- Movistar IPTV support

Fix
- QIS GUI bug issues


Please unzip the firmware file first then check the MD5 code.
MD5: 4397bf6a16b0705451bde3900e7991b6 Download