CVE-2025-59367

9.8 CRITICAL

📋 TL;DR

This authentication bypass vulnerability in certain ASUS DSL series routers allows remote attackers to gain unauthorized administrative access without valid credentials. It affects users of specific ASUS DSL router models, potentially exposing home and small business networks to complete compromise.

💻 Affected Systems

Products:
  • ASUS DSL series routers
Versions: Specific versions not detailed in advisory; refer to ASUS Security Advisory for exact affected models and firmware versions
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific DSL router models from ASUS. Users should check the ASUS Security Advisory for exact model numbers and firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network takeover: attacker gains full administrative control of router, can intercept all traffic, deploy malware to connected devices, change DNS settings, and use the network as a pivot point for further attacks.

🟠

Likely Case

Unauthorized access to router administration panel leading to network configuration changes, DNS hijacking, credential theft from connected devices, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if router is behind additional firewalls, has strong network segmentation, and regular monitoring detects unauthorized configuration changes quickly.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to remote attackers without requiring internal network access.
🏢 Internal Only: MEDIUM - If router administration interface is exposed internally, attackers who gain internal network access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity. No public proof-of-concept available at this time, but CVSS 9.8 suggests trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to ASUS Security Advisory for specific patched firmware versions

Vendor Advisory: https://www.asus.com/security-advisory

Restart Required: Yes

Instructions:

1. Visit ASUS Security Advisory page. 2. Identify your router model. 3. Download latest firmware from ASUS support site. 4. Log into router admin panel. 5. Navigate to firmware update section. 6. Upload and apply new firmware. 7. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Remote Administration

all

Prevents external attackers from accessing router administration interface

Login to router admin panel → Administration → System → Disable 'Enable Web Access from WAN'

Change Default Admin Port

all

Makes router admin interface less discoverable

Login to router admin panel → Administration → System → Change 'HTTPS Port' to non-standard port (e.g., 8443)

🧯 If You Can't Patch

  • Replace vulnerable router with supported model
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check router model and firmware version against ASUS Security Advisory list of affected devices

Check Version:

Login to router admin panel → Status → Firmware Version

Verify Fix Applied:

Verify firmware version in router admin panel matches or exceeds patched version listed in ASUS advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized login attempts to admin interface
  • Unexpected configuration changes
  • Admin login from unusual IP addresses

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND (event_type="admin_login" AND result="success" AND user!="authorized_user") OR (event_type="config_change" AND user!="authorized_user")

🔗 References

📤 Share & Export