A critical authentication bypass vulnerability (CVE-2025-59366, CVSS 9.8) in ASUS routers utilizing the AiCloud feature has been patched. The flaw allows remote, unauthenticated attackers to exploit chained path traversal and command injection vulnerabilities to execute unauthorized functions.
Business Impact
Compromised SOHO routers are a primary entry point for attacks on remote workers. An attacker controlling a home router can intercept corporate traffic, launch Man-in-the-Middle attacks, or pivot into the enterprise network via a connected VPN.
Why It Happened
The vulnerability exists in the AiCloud media server component, which is often exposed to the internet by default for remote access. Insufficient input validation allowed attackers to bypass authentication checks entirely.
Recommended Executive Action
Issue a security advisory to all remote employees using ASUS hardware to update their firmware immediately. Recommend disabling “AiCloud” and “Remote Access” features on personal routers if they are not strictly required.
Hashtags: #ASUS #IoT #RouterSecurity #Vulnerability #RemoteWork #PatchNow #CVE #CyberSecurity
