版本 3.0.0.4.382.502432018/04/1019.01 MBytes
ASUS RT-ACRH17 韧体版本 3.0.0.4.382.50243
- 修正资讯泄漏漏洞. 感谢 Haitan Xiang 及 Fand Wang.
- 修正CVE-2018-5721 Stack-base buffer overflow vulnerability
- 修正CVE-2018-8826 remote code code execution vulnerability. 感谢Chris Wood.
- 修正CVE-2018-5999 HTTP authorization bypass and CVE-2018-6000. An independent security researcher has reported this vulnerability to Beyond Security's SecuriTeam Secure Disclosure program
- 修正远端码执行漏洞. 感谢David Maciejak of Fortinet's FortiGuard Labs
- 修正CVE-2017-14491: DNS - 2 byte heap based overflow
- 修正CVE-2017-14492: DHCP - heap based overflow
- 修正CVE-2017-14493: DHCP - stack based overflow
- 修正CVE-2017-14494: DHCP - info leak
- 修正CVE-2017-14495: DNS - OOM DoS
- 修正CVE-2017-14496: DNS - DoS Integer underflow
- 修正CVE-2017-13704: Bug collision
请先将档案解压缩後再用原始韧体档案进行MD5确认
MD5: 8671feca1cf04d6952fde4925c6d3e1a
本网站所收集的部分公开资料来源于互联网,转载的目的在于传递更多信息及用于网络分享,并不代表本站赞同其观点和对其真实性负责,也不构成任何其他建议。如遇侵权请发邮件admin#asussmart.com 进行删除(#替换成@)!本站会跳转到JD网站,如你不能接受,请退出访问本网站,本站没有为你免费服务的义务,也请大家文明访问!