Darknet Diaries aired an episode back in 2017[1] that discusses the widespread vulnerabilities of ASUS routers. This latest development comes as no surprise.
> Disabling the 'backdoor' seems to just involve disabling SSH.
Maybe. My guess these are essentially Linux systems, so if attackers know that their exploits are widely known then they will likely try to figure out ways to install kernel mod rootkits.
It'll then end up in a situation with Windows XP/Vista days were IT desktop support staff would run malware removal tools to get rid of porn pop-ups on desktops only to have "reinfections" pop up a day or week or two later.
They'd blame users for this, but really they just never actually removed the command and control botnet features. They just addressed their payloads. The machines were never actually fixed in the first place.
My point was that if the attackers cared enough to put (not much) effort into keeping control of these routers then neither of those approaches is likely to be sufficient.
This sort of thing is why there is such a emphasis on TPM and trusted boot on modern PCs.
It is quite funny and insane, that there isn't any quality vendors in the router/switch market (though can't say anything of $10k+ hardware). Same phenomenon is with domain name registrars (except one or two are feasible). Oh, and printer market (one or two are feasible).
I reached a similar point where I was done dealing with crappy consumer gear but even OpenWRT didn't help my situation much because the hardware I had was just plain bad.
That's when I decided to switch to Mikrotik routers and Ubiquity for APs and have had no regrets about that decision other than the relatively steep learning curve.
I wonder if these backdoors also exist on devices with the Asuswrt-Merlin[1] 3rd party firmware, which are forks of the official firmwares + a bunch of stuff.
Darknet Diaries aired an episode back in 2017[1] that discusses the widespread vulnerabilities of ASUS routers. This latest development comes as no surprise.
[1] https://darknetdiaries.com/episode/5/