Tomato for Asus RT-AC66U/R

Discussion in 'Tomato Firmware' started by bhall7, Aug 5, 2013.

  1. bhall7

    bhall7 LI Guru Member

    Just read about the vulnerabilities in the Asus RT-AC66U/R and wondering if now is a good time to abandon stock Asus firmware and choose Tomato. I know that there is an ongoing effort to release a version of Tomato USB for the RT-AC66U/R, and I understand that there may be a beta release, but that it is still not fully operational because of the move to a new chipset. I use the 5GHz band exclusively due to high 2GHz interference in my area, so that is one thing that has prevented me from adopting the most recent beta versions.

    Where can I find out about the latest version of Tomato USB for the RT-AC66U/R?

  2. bhall7

    bhall7 LI Guru Member

  3. jerrm

    jerrm Network Guru Member

    Shibby is the most active on the AC66U, check his thread or site.
  4. RMerlin

    RMerlin Network Guru Member

    acsd would be common to Tomato as well, so the same security vulnerabilities would apply to Tomato.

    This is something that will have to be patched by Broadcom.
  5. Monk E. Boy

    Monk E. Boy Network Guru Member

    An easy workaround for this vulnerability is to not log into your router unless you absolutely need to be logged into your router. Without an active logon, and the user with that active logon being fooled into clicking a link, the security problem is mitigated.

    Changing the default subnet range to be something other than could mitigate it as well. Changing all default values to non-default values (e.g. subnet range, router name, etc.) could mitigate it was well.

    I log into my home router once a week at most, once a month at least. I never leave a router at default settings for longer than it takes to configure it. If I, all of a sudden, out of the blue, got prompted to log into my website I would know something is up.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice