Newegg has
ASUS RT-BE58U WiFi 7 AiMesh Extendable Router on sale for $139.99 - 10% off promo code for completing router survey (see details below) =
$125.99.
Shipping is free.
Thanks to community member
sr71 for finding this deal.
Router Survey Discount:
- Go to ASUS RT-BE58U WiFi 7 AiMesh Extendable Router
- Click the link for "Get extra savings by telling us what router you use"
- Fill out the form (must use email address associated with Newegg account)
- Apply the promo code you receive in cart: ASUSRT10
- Must complete survey for promo code to be accepted in cart
Product Details:
- Supports WiFi 7 (802.11be) with dual-band speeds up to 3600 Mbps for next-gen connectivity.
- Features AiMesh technology for easy whole-home mesh network expansion with other ASUS routers.
- Includes 2.5G WAN/LAN port and 4x 1G LAN ports for flexible, high-speed wired connections.
- Utilizes 4K-QAM modulation for up to 20% more efficient data transmission compared to WiFi 6.
- Supports Multi-Link Operation (MLO) for seamless, low-latency connections by combining 2.4 GHz and 5 GHz bands.
- Equipped with a quad-core 2.0 GHz CPU and 1 GB RAM for robust performance and advanced features.
Leave a Comment
Top Comments
The CyberSecurityDive article is awful and makes no mention as to the cause or solution for the vulnerability. The HotHardware article actually states what the vulnerability is and how to resolve it. Neither article actually pinpoints what hardware is actually vulnerable.
If you actually read the articles you linked, you would learn that the vulnerability is due to having SSH enabled. This setting is disabled by default on every single ASUS router I have ever touched and in some devices, completely removed to prevent nefarious access. It should go without saying that the "thousands of ASUS routers" that are truly compromised are probably really old units.
Old firmware versions of the TM-AC1900 (T-Mobile branded AC68U) had SSH access available (but disabled) and was later removed to prevent people from flashing it from T-Mobile's firmware to Asus's "official" firmware or Merlin. People flashing their TM-AC1900 devices had to enable SSH so that they could pull some .bin files off the device, alter them, and then upload them back to the router. Anybody tech savvy enough to do all this is probably smart enough to disable SSH afterwards, but that doesn't mean people don't forget.
Either way, 99% of the people with ASUS routers aren't affected by this and the remaining 1% set themselves up for failure for not being diligent with their tinkering.
42 Comments
Sign up for a Slickdeals account to remove this ad.
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
Personally, I would be leery of Asus routers, especially if you are not tech savy...https://www.cybersecuritydive.com...ng/749259/https://hothardware.com/news/asus...e-upgrades
Thanks prompted me to check the app and a new firmware was downloaded to both my routers. Appreciate the heads up
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
Our community has rated this post as helpful. If you agree, why not thank Redflyer
Sign up for a Slickdeals account to remove this ad.
Our community has rated this post as helpful. If you agree, why not thank freakingwilly
https://www.cybersecuri
https://hothardware.com/news/asus...e-upgrades
The CyberSecurityDive article is awful and makes no mention as to the cause or solution for the vulnerability. The HotHardware article actually states what the vulnerability is and how to resolve it. Neither article actually pinpoints what hardware is actually vulnerable.
If you actually read the articles you linked, you would learn that the vulnerability is due to having SSH enabled. This setting is disabled by default on every single ASUS router I have ever touched and in some devices, completely removed to prevent nefarious access. It should go without saying that the "thousands of ASUS routers" that are truly compromised are probably really old units.
Old firmware versions of the TM-AC1900 (T-Mobile branded AC68U) had SSH access available (but disabled) and was later removed to prevent people from flashing it from T-Mobile's firmware to Asus's "official" firmware or Merlin. People flashing their TM-AC1900 devices had to enable SSH so that they could pull some .bin files off the device, alter them, and then upload them back to the router. Anybody tech savvy enough to do all this is probably smart enough to disable SSH afterwards, but that doesn't mean people don't forget.
Either way, 99% of the people with ASUS routers aren't affected by this and the remaining 1% set themselves up for failure for not being diligent with their tinkering.
Sign up for a Slickdeals account to remove this ad.
Leave a Comment