Code Defence Cyber security

Critical Flaw in ASUS AiCloud Routers (CVE-2025-59366) Exposed

A critical authentication bypass vulnerability (CVE-2025-59366, CVSS 9.2) has been disclosed in ASUS AiCloud routers. The flaw allows unauthenticated attackers to bypass security checks and execute privileged functions, effectively taking full control of the device.

Business Impact

With many employees working from home, compromised SOHO routers are a direct gateway into corporate networks. Attackers can use these devices to intercept traffic, launch man-in-the-middle attacks, or pivot into the enterprise VPN connected to the device.

Why It Happened

The vulnerability lies in the AiCloud remote access feature, which fails to properly validate user sessions. This allows attackers to send malicious requests that the router processes as if they came from an administrator.

Recommended Executive Action

Issue an advisory to remote employees using ASUS routers to update their firmware immediately. Recommend disabling the “AiCloud” and “Remote Access” features on personal routers unless strictly necessary, as these are frequent targets for exploitation.

Hashtags: #ASUS #Vulnerability #IoT #RemoteWork #RouterSecurity #CyberSecurity #PatchNow #InfoSec

Scroll to Top

Review My Order

0

Subtotal