Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ASUS Flags Critical AiCloud Router Flaw

November 27, 2025
Reading Time: 3 mins read
in Alerts
ASUS Flags Critical AiCloud Router Flaw

ASUS has recently released crucial new firmware designed to patch a total of nine security vulnerabilities discovered in its widely used routers. The most significant of these flaws is a critical authentication bypass vulnerability, identified as CVE-2025-59366, which specifically impacts routers where the AiCloud feature is active. AiCloud is an integrated, cloud-based remote access service available on many ASUS routers, effectively transforming them into private cloud servers capable of remote media streaming and storage. This vulnerability, as described by the Taiwanese electronics manufacturer, stems from an “unintended side effect of the Samba functionality,” which could potentially permit the execution of specific router functions without the necessary user authorization. Unprivileged remote attackers can exploit this weakness through a low-complexity attack chain involving path traversal and an OS command injection, notably requiring no user interaction to be successful.

Given the severity of this unauthenticated remote access flaw, the company has issued an urgent public warning. In a recent advisory, ASUS stated, “To protect your devices, ASUS strongly recommends that all users update their router firmware to the latest version immediately,” further adding, “We encourage you to do this when new firmware becomes available.” While the advisory did not specify the exact router models affected, it did list the specific firmware versions that contain the necessary patch. For users who own end-of-life router models that will not be receiving any further firmware updates, the company has provided essential mitigation measures to help secure their networks against potential compromise, even without the patch.

To preemptively block attacks like the one targeting CVE-2025-59366, users are strongly advised to disable all services that are accessible from the Internet. This critical list of services includes remote access from WAN, port forwarding, DDNS, VPN server functionality, DMZ, port triggering, and FTP. Furthermore, the company specifically recommended cutting off all remote access to any device currently running the AiCloud software, which is the primary vector for exploitation of the newly discovered vulnerability. These actions effectively reduce the exposed attack surface of the router, denying remote attackers an easy initial point of entry into the device and the connected network.

In addition to disabling exposed services, ASUS has also provided a set of general security best practices to further strengthen the router’s defenses against future and potential attacks. These supplementary measures include adopting and strictly enforcing the use of strong, complex passwords for both the router’s administration page and all wireless network connections. This proactive approach to password hygiene creates a robust initial barrier to unauthorized access, protecting the device even if an external vulnerability were to be found. Implementing these simple yet crucial steps can significantly enhance the long-term security posture of the device.

This latest patch follows a previous incident in April where ASUS addressed a different, but similarly critical, authentication bypass flaw identified as CVE-2025-2492, which was also triggered by a specially crafted request aimed at routers with AiCloud enabled. This earlier vulnerability, along with six other security issues, was actively exploited in a widespread global campaign known as Operation WrtHug. This campaign successfully hijacked thousands of ASUS WRT routers, specifically targeting outdated or end-of-life devices across regions including Southeast Asia, Russia, Central Europe, the United States, and Taiwan. SecurityScorecard researchers who monitored the campaign have expressed the belief that the compromised routers are likely being leveraged as operational relay boxes (ORB) by Chinese hacking groups, serving as stealthy relay nodes to proxy and conceal their command-and-control infrastructure.

Reference:

  • ASUS Flags New Critical Authentication Bypass Flaw Impacting AiCloud Home Routers
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial