ASUS RT-AC54U Vista 64-bit Drivers
Utilities
ASUS Firmware Restoration version 2.0.0.0 OS support: Windows XP/Vista/7/8/8.1/10
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.
NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download
ASUS Device Discovery version 1.4.7.1 You can use the device discovery tool to find the IP address of wireless router.
OS Support: Windows XP/Vista/7/8/8.1/10 Download
Utility supports MFP (Multi-function Peripheral, MFP or All-in-One Printer) version 1.0.5.5 This utility can help you set up the USB printer to connect to the router, and use EZ printer sharing in Windows OS.
Please refer the supported printers list as following link:
http://event.asus.com/2009/networks/printersupport
OS Support:Windows XP/Vista/7/8/8.1/10 Download
Firmware
ASUS RT-AC54U Firmware version3.0.0.4.380.8457 Security fixes:
- Fixed Reflected XSS vulnerability.
- Fixed CSRF vulnerability.
- Fixed command injection vulnerability.
- Fixed stack buffer overflow vulnerability.
Thanks for Rick Ramgattie contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: bf75665f36a2835e70d55c6e263d9101 Download
ASUS RT-AC54U Firmware version 3.0.0.4.380.8287 - Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighttpd.
- Fixed AiCloud login bugs.
- Modified Quick Internet Setup wizard process.
Please unzip the firmware file first then check the MD5 code.
MD5: c149dcba19635959a2576af9b8ccaf7a Download
ASUS RT-AC54U Firmware version 3.0.0.4.380.8228 Fixed KRACK vulnerability
Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
Fixed CVE-2017-14492: DHCP - heap based overflow
Fixed CVE-2017-14493: DHCP - stack based overflow
Fixed CVE-2017-14494: DHCP - info leak
Fixed CVE-2017-14495: DNS - OOM DoS
Fixed CVE-2017-14496: DNS - DoS Integer underflow
Fixed CVE-2017-13704: Bug collision
Fixed AiCloud 2.0 Reflected XSS Vulnerability. Thanks to Guy Arazi and Niv Levi contribution.
Thanks to Guy Arazi for following vulnerabilities.
- AiCloud 2.0 Stored XSS Share link manager.
- AiCloud 2.0 Reflected XSS - "share a link"
- Download Master HTTP service DoS vulnerability.
- Download Master Reflected XSS Main login.
- Fixed Smart Sync Stored XSS vulnerabilities.
Please unzip the firmware file first then check the MD5 code.
MD5: 674cb2576c13dc91e83a7a72b014a2dc Download