ASUS RT-BE58U Dual-Band Wi-Fi 7 Router $229 (Was $299) + Delivery ($0 VIC, NSW, ACT, QLD C&C/ in-Store) @ Bing Lee

120
This post contains affiliate links. OzBargain might earn commissions when you click through and make purchases. Please see this page for more information.

All time low on the ASUS RT-BE58U Dual-Band Wi-Fi 7 Router $229 (Was $299).

2.0GHz Quad-Core CPU.
1GB RAM & 256MB Flash.
1 x 2.5G WAN/LAN port.
1 x 1G WAN/LAN port.
3 x 1G LAN ports.
1 x USB 3.2 Gen1.
2.4GHz and 5GHz Dual Band Wi-Fi 7. No 6GHz.
Supports ASUS AiMesh.

Full specs.

Review with Gigabit speedtests.

Note: Update to the latest ASUS firmware.

Related Stores

Bing Lee
Bing Lee

Comments

  • +1

    Hmm low quality cheaply-made entry-level Wi-Fi 7 router with just wifi 6 speeds. Plenty of issues like wifi dropouts and dead zones, needing to restart, USB not working, etc. according to reviews 1, 2, 3

    • Entry level Wi-Fi 7 is suitable for most users. If you have Wi-Fi dead zones you'll likely need a mesh or wired backhaul setup regardless.

      There are other reviews saying they have no problems. New firmware updates have fixed some problems.

      • +3

        From my experience with a recent be88u router purchase in Australia, I found that my router was set to China as the region out of the box. Switching to Australia boosted the wifi signal strengths and gave me access to more bands.

  • i recently got ASUS TUF Gaming BE3600 from aliexpress for my mesh and it cost like $150 - bargain and works great so far

    • Can it be loaded with Merlin? Is the BE3600 the same as BE58U?

      • Merlin firmware is compatible with the ASUS…

        RT-BE96U
        GT-BE98 Pro
        RT-BE86U
        RT-BE88U
        RT-BE92U

  • +2

    Might want to wait until Thousands of Asus routers are being hit with stealthy, persistent backdoors is resolved:

    Thousands of home and small office routers manufactured by Asus are being infected with a stealthy backdoor that can survive reboots and firmware updates in an attack by a nation-state or another well-resourced threat actor, researchers said.

    The unknown attackers gain access to the devices by exploiting now-patched vulnerabilities, some of which have never been tracked through the internationally recognized CVE system. After gaining unauthorized administrative control of the devices, the threat actor installs a public encryption key for access to the device through SSH. From then on, anyone with the private key can automatically log in to the device with administrative system rights.

    • +1

      If your router has been accessed, the best thing you can do is a factory reset, advises PCMag security analyst Kim Key. This attack is a formidable one, GreyNoise says, because it "survives both reboots and firmware updates, giving them durable control over affected devices." A factory reset will get around this. In most other cases, updating the firmware would've solved the problem.

      Asus also recommends you remove or disable the SSH entry and block the following four IP addresses, according to ZDNet:

      101.99.91.151
      101.99.94.173
      79.141.163.179
      111.90.146.237

      If your router was not accessed, update the firmware to prevent any future issues. Asus fixed the CVE-2023-39780 flaw with its latest firmware update.

      https://au.pcmag.com/wireless-routers/111311/cybercriminals-…

      Merlin said…

      This article is about the malware itself, not about a new security issue. That malware is getting installed through brute forcing of the login, or through old security issues (one of them going back to 2023 - long fixed).

      https://www.snbforums.com/threads/greynoise-discovers-stealt…

  • +1

    That's for people running Merlin firmware.
    For the rest….
    The only way for router users to determine whether their devices are infected is by checking the SSH settings in the configuration panel. Infected routers will show that the device can be logged in to by SSH over port 53282 using a digital certificate with a truncated key of: ssh-rsa AAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ…

    To remove the backdoor, infected users should remove the key and the port setting.

    • +3

      It's irrespective of firmware :/

      The SSH backdoor is loaded via brute forcing the password … to do that a person must both 1) Have their router WebUI accessible to WAN (neither standard firmware nor Merlin have this feature active by default) and 2) have a weak password!

  • Why not just Flint 2?

    • Don't tell everyone, otherwise they will start buying them and the price will go up. :-)

  • wonder if i would notice a difference to my asus ax-59u ? or if it has featured i might want ?

    • Unlikely. RT-AX59U is suitable for Gigabit speeds and below.

      • +1

        thks will save coins for something more useful.

Login or Join to leave a comment