Newegg has
ASUS RT-BE58U WiFi 7 AiMesh Extendable Router on sale for $139.99 - 10% off promo code for completing router survey (see details below) =
$125.99.
Shipping is free.
Thanks to community member
sr71 for finding this deal.
Router Survey Discount:
- Go to ASUS RT-BE58U WiFi 7 AiMesh Extendable Router
- Click the link for "Get extra savings by telling us what router you use"
- Fill out the form (must use email address associated with Newegg account)
- Apply the promo code you receive in cart: ASUSRT10
- Must complete survey for promo code to be accepted in cart
Product Details:
- Supports WiFi 7 (802.11be) with dual-band speeds up to 3600 Mbps for next-gen connectivity.
- Features AiMesh technology for easy whole-home mesh network expansion with other ASUS routers.
- Includes 2.5G WAN/LAN port and 4x 1G LAN ports for flexible, high-speed wired connections.
- Utilizes 4K-QAM modulation for up to 20% more efficient data transmission compared to WiFi 6.
- Supports Multi-Link Operation (MLO) for seamless, low-latency connections by combining 2.4 GHz and 5 GHz bands.
- Equipped with a quad-core 2.0 GHz CPU and 1 GB RAM for robust performance and advanced features.
Top Comments
The CyberSecurityDive article is awful and makes no mention as to the cause or solution for the vulnerability. The HotHardware article actually states what the vulnerability is and how to resolve it. Neither article actually pinpoints what hardware is actually vulnerable.
If you actually read the articles you linked, you would learn that the vulnerability is due to having SSH enabled. This setting is disabled by default on every single ASUS router I have ever touched and in some devices, completely removed to prevent nefarious access. It should go without saying that the "thousands of ASUS routers" that are truly compromised are probably really old units.
Old firmware versions of the TM-AC1900 (T-Mobile branded AC68U) had SSH access available (but disabled) and was later removed to prevent people from flashing it from T-Mobile's firmware to Asus's "official" firmware or Merlin. People flashing their TM-AC1900 devices had to enable SSH so that they could pull some .bin files off the device, alter them, and then upload them back to the router. Anybody tech savvy enough to do all this is probably smart enough to disable SSH afterwards, but that doesn't mean people don't forget.
Either way, 99% of the people with ASUS routers aren't affected by this and the remaining 1% set themselves up for failure for not being diligent with their tinkering.
34 Comments
Sign up for a Slickdeals account to remove this ad.
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
As far as I can tell, Asus is one of the routers that provides regular updates to fix CVEs. If not Asus, which routers do you think are better?
Personally, I would be leery of Asus routers, especially if you are not tech savy...https://www.cybersecuritydive.com...ng/749259/https://hothardware.com/news/asus...e-upgrades
Thanks prompted me to check the app and a new firmware was downloaded to both my routers. Appreciate the heads up
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
Asus routers are absolutely amazing. The next step up would be Ubiquiti but then you would need to be tech savvy.
Our community has rated this post as helpful. If you agree, why not thank Redflyer
Sign up for a Slickdeals account to remove this ad.
Thats because of age. When wifi 6 was first release there was issues. Same thing with wifi 7 which is why i give it about a year for them to release new firmware. I recently upgraded to the BE86U and had no issues with it.
Our community has rated this post as helpful. If you agree, why not thank freakingwilly
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
The CyberSecurityDive article is awful and makes no mention as to the cause or solution for the vulnerability. The HotHardware article actually states what the vulnerability is and how to resolve it. Neither article actually pinpoints what hardware is actually vulnerable.
If you actually read the articles you linked, you would learn that the vulnerability is due to having SSH enabled. This setting is disabled by default on every single ASUS router I have ever touched and in some devices, completely removed to prevent nefarious access. It should go without saying that the "thousands of ASUS routers" that are truly compromised are probably really old units.
Old firmware versions of the TM-AC1900 (T-Mobile branded AC68U) had SSH access available (but disabled) and was later removed to prevent people from flashing it from T-Mobile's firmware to Asus's "official" firmware or Merlin. People flashing their TM-AC1900 devices had to enable SSH so that they could pull some .bin files off the device, alter them, and then upload them back to the router. Anybody tech savvy enough to do all this is probably smart enough to disable SSH afterwards, but that doesn't mean people don't forget.
Either way, 99% of the people with ASUS routers aren't affected by this and the remaining 1% set themselves up for failure for not being diligent with their tinkering.
As far as I know, Tri-Band was designed for those having to use a wireless backhaul. If you are using a wired backhaul then there is very little reason to hold out for Tri-Band over Dual-Band.
Those who live in heavily congested areas, like high density apartment complexes could benefit from the 6 ghz band too.
Sign up for a Slickdeals account to remove this ad.
You're just ASKING for trouble if you expose any infrastructure management interface to the internet.