ASUS RT-N66W Windows 8.1 64-bit Drivers
Utilities
ASUS Device Discovery version 1.4.8.2 You can use the device discovery tool to find the IP address of wireless router.
OS Support: Windows XP/7/8/8.1/10 Download
ASUS Firmware Restoration version 2.1.0.2 OS support: Windows XP/7/8/8.1/10
Firmware Restoration is used on an ASUS Wireless Router that failed during its firmware upgrading process. It uploads the firmware that you specify.
NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Download
ASUS Device Discovery version 1.4.8.0 You can use the device discovery tool to find the IP address of wireless router.
OS support : Win XP, Win 7, Win8, Win10 Download
Firmware
ASUS RT-N66W Firmware version 3.0.0.4.382.52272 - Fixed CVE-2018-20334
- Fixed CVE-2018-20336
- Fixed null pointer issue.
- Fixed DDoS vulnerability.
- Fixed command injection vulnerability.
- Fixed buffer overflow vulnerability.
- Updated OTA function.
Please unzip the firmware file first then check the MD5 code.
MD5: 1c42577ee323c273eec006b99ad635c6 Download
ASUS RT-N66W Firmware version 3.0.0.4.382.51641 - Fix a DDoS vulnerability.
Please unzip the firmware file first then check the MD5 code.
MD5: a92ef54c320871859fe40c2678fd35de Download
ASUS RT-N66W Firmware version 3.0.0.4.382.51640 - Fixed firmware update notification bugs.
- Fixed dual wan user interface bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: af3f30bd70e4bc394782211209515a10 Download
ASUS RT-N66W Firmware version 3.0.0.4.382.51636 Security Fix
- Fixed DDoS vulnerability.
- Fixed AiCloud vulnerability. Thanks for Matt Cundari's contribution.
- Fixed command injection vulnerability. Thanks for S1mba Lu's contribution.
- Fixed buffer overflow vulnerability. Thanks for Javier Aguinaga's contribution.
- Fixed CVE-2018-20334
- Fixed CVE-2018-20336
- Fixed null pointer issue. Thanks for CodeBreaker of STARLabs’ contribution.
- Fixed AiCloud buffer overflow vulnerability. Thanks for Resecurity International's contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: f4bda506824b9b82ee2594c1ec397f8a Download
ASUS RT-N66W Firmware version 3.0.0.4.382.50702 - Fixed bugs.
- Improved system stability.
Please unzip the firmware file first then check the MD5 code.
MD5: 5b0ab9d736dc73001c315a6d83329966 Download
ASUS RT-N66W Firmware version 3.0.0.4.382.50470 - Support multi-language (UTF-8) network name
(Windows XP and Windows 7 do not support UTF-8 format SSID. These two OS may see gibberish if using multi-language SSID.)
- Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighttpd.
- Fixed AiCloud cannot login issue.
- Modified Quick Internet Setup wizard process.
- Main SSID and guest network can hide independently.
Please unzip the firmware file first then check the MD5 code.
MD5: 906ff822635bb62e724b64a5e84c3ec3 Download
ASUS RT-N66W Firmware version 3.0.0.4.380.8228 - Fixed information disclosure vulnerability. Thanks to Haitan Xiang and Fand Wang.
- Fixed CVE-2018-5721 Stack-base buffer overflow vulnerability
- Fixed CVE-2018-8826 remote code code execution vulnerability. Thanks to Chris Wood.
- Fixed CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
- Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
- Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
- Fixed CVE-2017-14492: DHCP - heap based overflow
- Fixed CVE-2017-14493: DHCP - stack based overflow
- Fixed CVE-2017-14494: DHCP - info leak
- Fixed CVE-2017-14495: DNS - OOM DoS
- Fixed CVE-2017-14496: DNS - DoS Integer underflow
- Fixed CVE-2017-13704: Bug collision
- Fixed AiCloud 2.0 Reflected XSS Vulnerability. Thanks to Guy Arazi and Niv Levi contribution.
Thanks to Guy Arazi for following vulnerabilities.
- AiCloud 2.0 Stored XSS Share link manager.
- AiCloud 2.0 Reflected XSS - "share a link"
- Download Master HTTP service DoS vulnerability.
- Download Master Reflected XSS Main login.
Please unzip the firmware file first then check the MD5 code.
MD5: 2c287b2686dda7550752eb7989ae5904 Download