There have been a couple of announcements over the last few days of a botnet made up of Asus routers. This seems to include a hardware-persistent backdoor.
Are Asus routers running OpenWrt vulnerable to this? If so, how can I patch my AX6000 or whatever?
Noyhing to do with hardware.
asuswrt stores config in uboot environment, there is no other "disk" as reporters dream about.
in general vulnerable routers are asuswrt ones not patched for 2 years. And another reason to not browse nefarious sites while home server admin tab is open in same brrowser.
Yeah, I'd like to know also now before flashing my ASUS TUF-AX6000 with OpenWRT....
But to note, my router will be behind an OPNSense firewall, so I don't think it will be so easy for someone to get in, unless they're connected to the wifi.
Some people preserve it so they can revert to stock and this old firmware sticks around in case an update fails. It is triggered by, usually, 3 failed boots.
You can overwrite it with a known-working install of OpenWrt. If you have installed OpenWrt and then updated without taking steps to preserve this partition it was, most likely, overwritten with OpenWrt already.
Does that require that a homeserver admin tab is open, though? I would think this would work anytime, unless you use something like the "Block Outsider Intrusion into LAN" blocklist in uBlock Origin.
Since I do, it just returns a list of all checked IPs.
I honestly dont understand why is it possible to do such network requests by default on any modern web browser because it can be very dangerous. Sure, finding a working IP this way may take some time, and the usable protocols are limited, but it is still bad. Like, websites can just connect to any port open on your computer, maybe even if its bound only to localhost! Jetbrains IDEs and some other things specifically listen for such connections so that their website can implement convenience features like plugin install from the jetbrains website, and maybe even worse things.