ASUS is warning about an authentication bypass vulnerability in routers with AiCloud enabled that might permit distant attackers to carry out unauthorized execution of capabilities on the machine.
The vulnerability, tracked below CVE-2025-2492 and rated vital (CVSS v4 rating: 9.2), is remotely exploitable by way of a specifically crafted request and requires no authentication, making it notably harmful.
“An improper authentication management vulnerability exists in sure ASUS router firmware sequence,” reads the seller’s bulletin.
“This vulnerability will be triggered by a crafted request, probably resulting in unauthorized execution of capabilities.”
AiCloud is a cloud-based distant entry function constructed into many ASUS routers, turning them into mini non-public cloud servers.
It permits customers to entry information saved on USB drives related to the router from anyplace over the web, stream media remotely, sync information between dwelling networks and different cloud storage providers, and share information with others by way of hyperlinks.
The vulnerability found in AiCloud impacts a broad vary of fashions, with ASUS releasing fixes for a number of firmware branches, together with 3.0.0.4_382 sequence, 3.0.0.4_386 sequence, 3.0.0.4_388 sequence, and three.0.0.6_102 sequence.
Customers are advisable to improve to the newest firmware model obtainable for his or her mannequin, which they will discover on the seller’s help portal or the product finder web page. Detailed directions on learn how to apply firmware updates can be found right here.
ASUS additionally advises customers to make use of distinct passwords to safe their wi-fi community and router administration web page, and ensure they’re not less than 10 characters lengthy with a mixture of letters, numbers, and symbols.
Impacted customers of end-of-life merchandise are suggested to disable AiCloud completely and switch off web entry for WAN, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP providers.
Whereas there are not any reviews of energetic exploitation or a public proof-of-concept exploit for CVE-2025-2492, attackers generally goal these flaws to contaminate units with malware or recruit them into DDoS swarms.
Due to this fact, it’s strongly suggested that ASUS router customers improve to the newest firmware as quickly as doable.