A critical authentication bypass vulnerability (CVE-2025-59366, CVSS 9.2) has been disclosed in ASUS AiCloud routers. The flaw allows unauthenticated attackers to bypass security checks and execute privileged functions, effectively taking full control of the device.
Business Impact
With many employees working from home, compromised SOHO routers are a direct gateway into corporate networks. Attackers can use these devices to intercept traffic, launch man-in-the-middle attacks, or pivot into the enterprise VPN connected to the device.
Why It Happened
The vulnerability lies in the AiCloud remote access feature, which fails to properly validate user sessions. This allows attackers to send malicious requests that the router processes as if they came from an administrator.
Recommended Executive Action
Issue an advisory to remote employees using ASUS routers to update their firmware immediately. Recommend disabling the “AiCloud” and “Remote Access” features on personal routers unless strictly necessary, as these are frequent targets for exploitation.
Hashtags: #ASUS #Vulnerability #IoT #RemoteWork #RouterSecurity #CyberSecurity #PatchNow #InfoSec
