HomeVulnerabilityASUS Confirms Crucial Flaw in AiCloud Routers; Customers Urged to Replace Firmware

ASUS Confirms Crucial Flaw in AiCloud Routers; Customers Urged to Replace Firmware

ASUS has disclosed a vital security flaw impacting routers with AiCloud enabled that would allow distant attackers to carry out unauthorized execution of capabilities on vulnerable gadgets.

The vulnerability, tracked as CVE-2025-2492, has a CVSS rating of 9.2 out of a most of 10.0.

Cybersecurity

“An improper authentication management vulnerability exists in sure ASUS router firmware sequence,” ASUS stated in an advisory. “This vulnerability might be triggered by a crafted request, probably resulting in unauthorized execution of capabilities.”

The shortcoming has been addressed with firmware updates for the next branches –

  • 3.0.0.4_382
  • 3.0.0.4_386
  • 3.0.0.4_388, and
  • 3.0.0.6_102

For optimum safety, it is really useful to replace their situations to the most recent model of the firmware.

“Use totally different passwords to your wi-fi community and router administration web page,” ASUS stated. “Use passwords which have no less than 10 characters, with a mixture of capital letters, numbers, and symbols.”

Cybersecurity

“Don’t use the identical password for multiple system or service. Don’t use passwords with consecutive numbers or letters, similar to 1234567890, abcdefghij, or qwertyuiop.”

See also  Current Juniper Flaws Chained in Attacks Following PoC Exploit Publication

If rapid patching will not be an possibility or the routers have reached end-of-life (EoL), it is suggested to guarantee that login and Wi-Fi passwords are robust.

Another choice is to disable AiCloud and any service that may be accessed from the web, similar to distant entry from WAN, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular