Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16

    At $75, who gives a crap if you drop this Chromebook?

    Getting sick of all the Prime Video ads? Amazon quietly doubled them

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      Another LastPass User Loses $200,000 in Crypto to Hackers

      June 13, 2025

      Stellar (XLM) Price Hits Monthly Low – What’s Next?

      June 13, 2025

      Crypto Founder Sentenced to 8 Months in Prison on Wash Trading Charges

      June 13, 2025

      3 Altcoins That Are Thriving Despite Today’s Brief Market Crash

      June 13, 2025

      Top Altcoins Trending in Nigeria as Traders Shift Beyond Bitcoin, Ethereum

      June 13, 2025
    • Technology

      Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16

      June 14, 2025

      At $75, who gives a crap if you drop this Chromebook?

      June 14, 2025

      Getting sick of all the Prime Video ads? Amazon quietly doubled them

      June 14, 2025

      Bad news for older PCs: DDR4 memory is nearing an end

      June 14, 2025

      Want the best iPadOS 26 experience this fall? Get this M3 iPad Air for just $499

      June 14, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»One-Click RCE in Asus’s Preinstalled Driver Software
    Technology

    One-Click RCE in Asus’s Preinstalled Driver Software

    TechAiVerseBy TechAiVerseMay 11, 2025No Comments8 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    One-Click RCE in Asus’s Preinstalled Driver Software
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    One-Click RCE in Asus’s Preinstalled Driver Software

    One-Click RCE in ASUS’s Preinstalled Driver Software

    Introduction

    This story begins with a conversation about new PC parts.

    After ignoring the advice from my friend, I bought a new ASUS motherboard for my PC. I was a little concerned about having a BIOS that would by default silently install software into my OS in the background. But it could be turned off so I figured I would just do that.

    Immediately after logging into Windows I was hit with a notification requesting admin permissions to complete the installation of ASUS DriverHub, because I forgot to change the BIOS option. Since I needed to get a WiFi driver for the motherboard anyway, I got curious and installed it.

    I don’t have a screenshot of DriverHub but it showed a popup exactly like this in the bottom-right of my screen

    DriverHub

    DriverHub is an interesting piece of driver software because it doesn’t have any GUI. Instead it’s just a background process that communicates with the website driverhub.asus.com and tells you what drivers to install for your system and which ones need updating. Naturally I wanted to know more about how this website knew what drivers my system needed and how it was installing them, so I cracked open the Firefox network tab.

    As I expected, the website uses RPC to talk to the background process running on my system. This is where the background process hosts an HTTP or Websocket service locally which a website or service can connect to by sending an API request to 127.0.0.1 on a predefined port, in this case 53000.

    Right about now my elite hacker senses started tingling.

    This is a very sketchy way to design driver management software. If the RPC isn’t properly secured, it could be weaponized by an attacker to install malicious applications.

    Finding the Vulnerability

    The next step was to see if I could call the RPC from any website, this was replicated by copying the request from my browser as a curl command and pasting it into my terminal.

    After fiddling with variations of the command for a while my assumptions were confirmed. DriverHub only responded to requests with the origin header set to “driverhub.asus.com”. So at least this software wasn’t completely busted and evil hackers can’t just send requests to DriverHub willy-nilly.

    However I wasn’t done yet, presumably the program checks if the origin is driverhub.asus.hub and if so it’d accept RPC request. What I did next was see if the program did a direct comparison like origin == driverhub.asus.hub or if it was a wildcard match such as origin.includes("driverhub.asus.com").

    When I switched the origin to driverhub.asus.com.mrbruh.com, it allowed my request.

    It was obvious now there was a serious threat. The next step was to determine how much damage was possible.

    The Extent of the Damage

    By trawling through the Javascript on the website, and about 700k lines of decompiled code that the exe produced, I managed to create a list of callable endpoints including some unused ones sitting in the exe.

    • Initialize
      This command is used by the website to check if the software is installed and returns basic installation information.

    • DeviceInfo
      This returns all installed ASUS’s software, all installed .sys drivers, all your hardware components, and your MAC address.

    • Reboot
      This reboots the target device immediately without confirmation.

    Your browser does not support the video lmao

    • Log
      This returns a zipped copy of all of DriverHub’s logs.

    • InstallApp
      This installs an app or driver by its ID. The ID’s for all the apps are hard coded in an XML file which is provided by the DriverHub installer.

    • UpdateApp
      This self-updates DriverHub using a provided file URL to download and run.

    Achieving RCE

    I became fixated on the UpdateApp endpoint for obvious reasons. So I spent a few hours exploring the code in ghidra and hitting it with various curl requests to learn the intricacies of how it behaves.

    A request to the endpoint looks like this:

    curl "http://127.0.0.1:53000/asus/v1.0/UpdateApp" -X POST --data-raw '{"List": [{"Url": "https://driverhub.asus.com/"}]}'
    

    Here were the observations I had made about the UpdateApp function at that point.

    • The “Url” parameter must contain “.asus.com” but unlike the RPC origin check, it allows stupidity like example.com/payload.exe?foo=.asus.com
    • It saves the file with the filename specified at the end of the URL.
    • Any file with any extension can be downloaded
    • If the file is an executable signed by ASUS it will be automatically executed with admin permissions
    • It will run any executable signed by ASUS, not just a DriverHub installer.
    • If a downloaded file fails the signing check, it does not get deleted.

    When I learned that DriverHub validates the signature of the executable I suspected an RCE may no longer be possible, however I soldiered on regardless.

    My first thought was potentially a timing attack, where I tell DriverHub to install a valid executable, and after it validates the signature, but just before it installs the exe, I swap it out with a malicious executable. I theorized this could be possible by making two UpdateApp requests in parallel, with the malicious update being just after the legitimate one.

    However timing attacks need to be extremely precise and having that timing being affected by files needing to be downloaded made it a very unreliable option. Given that, I decided to take a step back and think if there were any other options.

    Eventually I was led back to the standalone WiFi driver I was going to install all along. The driver was distributed in the following zip file.

    The files of importance here are the AsusSetup.exe, AsusSetup.ini and SilentInstall.cmd. When executing AsusSetup.exe it first reads from AsusSetup.ini, which contains metadata about the driver. I took interest in a property in the file: SilentInstallRun.

    When you double-click AsusSetup.exe it launches a simple gui installer thingy. But if you run AsusSetup.exe with the -s flag (DriverHub calls it using this to do a silent install), it will execute whatever’s specified in SilentInstallRun. In this case the ini file specifies a cmd script that performs an automated headless install of the driver, but it could run anything.

    Here is the completed exploit chain

    1. Visit website with driverhub.asus.com.* subdomain

    2. Site makes UpdateApp request for PoC executable “calc.exe”

      “calc.exe” will be downloaded, fail the signature check and not be executed

    3. Site makes UpdateApp request for custom AsusSetup.ini

      This will also be downloaded and not executed

       [InstallInfo]
       SilentInstallPath=.
       SilentInstallRun=calc.exe
    
    1. Site makes UpdateApp request for signed ASUS binary “AsusSetup.exe”

      This will be downloaded and executed with admin permissions and does a silent install using -s, which will cause it to read the AsusSetup.ini file and run “calc.exe” specified in “SilentInstallRun” also with admin permissions

    PoC in action:

    Your browser does not support the video lmao

    Reporting Timeline (DD/MM/YYYY)

    • 07/04/2025 – Found the initial vulnerability
    • 08/04/2025 – Escalated the vulnerability to RCE
    • 08/04/2025 – Reported the vulnerability
    • 09/04/2025 – Automated response from ASUS
    • 17/04/2025 – I followed up and got a human response letting me know they had patched the software and sent me a build to verify
    • 18/04/2025 – ASUS confirmed the fix was live
    • 09/05/2025 – CVE-2025-3462 (8.4) and CVE-2025-3463 (9.4) were published

    Assessing the Damage

    Almost immediately after reporting the RCE to ASUS I wrote a script to track certificate transparency updates on my VPS, so I could see if anyone else had a domain with driverhub.asus.com.* registered. From looking at other websites certificate transparency logs, I could see that domains and subdomains would appear in the logs usually within a month.

    After a month of waiting I am happy to say that my test domain is the only website that fits the regex, meaning it is unlikely that this was being actively exploited prior to my reporting of it.

    Bug Bounty

    I asked ASUS if they offered bug bounties. They responded saying they do not, but they would instead put my name in their “hall of fame”. This is understandable since ASUS is just a small startup and likely does not have the capital to pay a bounty.

    Fun Notes

    • When submitting the vulnerability report through ASUS’s Security Advisory form, Amazon CloudFront flagged the attached PoC as a malicious request and blocked the submission. So I had to strip out some of the PoC code and link video recordings instead.

    • If you click “Install All” in DriverHub instead of manually clicking install on each recommended driver, it will also install ArmouryCrate, ASUS’s custom CPU-Z, Norton360 and WinRAR.

    • Their CVE description for the RCE is a little misleading. They say “This issue is limited to motherboards and does not affect laptops, desktop computers”, however this affects any computer including desktops/laptops that have DriverHub installed. Also, instead of them saying it allows for arbitrary/remote code execution they say it “may allow untrusted sources to affect system behaviour”.

    • MY ONBOARD WIFI STILL DOESN’T WORK, I had to buy an external USB WiFi adapter. Thanks for nothing DriverHub.

    • If you have any questions you can contact me on Signal (preferred) @paul19.84 or via email contact [at] mrbruh.com

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleToday’s NYT Connections: Sports Edition Hints and Answers for May 11, #230
    Next Article Thinkers and Doers
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16

    June 14, 2025

    At $75, who gives a crap if you drop this Chromebook?

    June 14, 2025

    Getting sick of all the Prime Video ads? Amazon quietly doubled them

    June 14, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 14, 2025

    Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16

    Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16 Skip to content Image:…

    At $75, who gives a crap if you drop this Chromebook?

    Getting sick of all the Prime Video ads? Amazon quietly doubled them

    Bad news for older PCs: DDR4 memory is nearing an end

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Your PC deserves around-the-clock privacy protection—get AdGuard’s Family Plan for $16

    June 14, 20250 Views

    At $75, who gives a crap if you drop this Chromebook?

    June 14, 20250 Views

    Getting sick of all the Prime Video ads? Amazon quietly doubled them

    June 14, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.