ASUS RT-ACRH17 Windows 11 64-bit Drivers
Utilities
ASUS Firmware Restoration version 2.1.0.3 OS support: Windows XP/7/8/8.1/10/11
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.
NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download
Firmware
ASUS RT-ACRH17 Firmware version 3.0.0.4.382.52517 Fixed the app login issue with iOS 14.5.
Please unzip the firmware file first then check the MD5 code.
MD5: d8a63fccabb78394c5202873969161be Download
ASUS RT-ACRH17 Firmware version 3.0.0.4.382.52516 - Improved system stability.
- Fixed GUI bugs.
- Security Fixed: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please unzip the firmware file first then check the MD5 code.
MD5: 4fb4b9f06b6b05c7f2013b434c17a66c Download
ASUS RT-ACRH17 Firmware version 3.0.0.4.382.51569 - Fix jumbo frame issue
- Fix Schedule Disk Scan issue
- Improve PPPoE stablility
- Fix guest network bandwidth limiter issue
- Fix physical button issue
Please unzip the firmware file first then check the MD5 code.
MD5: 08a1bc52bb92e744181d2eb7d6bd2c98 Download
ASUS RT-ACRH17 Firmware version 3.0.0.4.382.50470 - Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighthttpd
- Modified Quick Internet Setup wizard process.
- Main SSID and guest network can hide independently.
Please unzip the firmware file first then check the MD5 code.
MD5: d8d4f1b080274d3f71bb38c46877484c Download
ASUS RT-ACRH17 Firmware version 3.0.0.4.382.50243 - Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
- Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
- Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
- Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
- Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
- Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
- Fixed CVE-2017-14492: DHCP - heap based overflow
- Fixed CVE-2017-14493: DHCP - stack based overflow
- Fixed CVE-2017-14494: DHCP - info leak
- Fixed CVE-2017-14495: DNS - OOM DoS
- Fixed CVE-2017-14496: DNS - DoS Integer underflow
- Fixed CVE-2017-13704: Bug collision
Please unzip the firmware file first then check the MD5 code.
MD5: 8671feca1cf04d6952fde4925c6d3e1a Download