🚨 CRITICALintel

CVE-2025-59367 - ASUS DSL router auth bypass risk

CVE-2025-59367 (CVSS 9.3) affects ASUS DSL-AC51, DSL-N16 and DSL-AC750 router families and allows remote, unauthenticated attackers to bypass authentication and gain administrative access over the internet. ASUS released firmware version 1.1.2.3_1010 to patch the vulnerability. What's notable: networking devices like ASUS routers remain prime botnet targets—in May 2025, the AyySSHush botnet compromised over 9,000 ASUS routers by adding persistent SSH backdoors. For EOL models without patches, ASUS recommends disabling all internet-exposed services (WAN access, port forwarding, DDNS, VPN server, DMZ, FTP) and using strong unique passwords.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: CVE-2025-59367 creates a critical path for attackers to compromise ASUS DSL routers that often protect home offices, small branches and suppliers, turning unmanaged edge devices into staging points for data theft and account takeover. For enterprises with distributed workforces, this vulnerability can indirectly expose corporate SaaS, VPN and remote access portals through compromised user networks. Technical Context: The flaw is a remote authentication bypass in the router’s web management plane that allows unauthenticated HTTP(S) requests to succeed, enabling full administrative control with no valid credentials. Exploitation aligns with T1190 as attackers scan for exposed ASUS DSL models, then push configuration changes, deploy SSH backdoors or alter DNS to redirect users to phishing or malware infrastructure.

Strategic Intelligence Guidance

  • Identify and inventory all ASUS DSL-AC51, DSL-N16 and DSL-AC750 routers in use by staff, contractors and branch offices, and mandate upgrades to firmware 1.1.2.3_1010 or later.
  • Disable WAN-accessible management services and enforce strong, unique passwords for router admin and Wi-Fi networks, preventing default or reused credentials across sites.
  • Segment remote-user networks from sensitive systems via VPN profiles, conditional access and endpoint posture checks so compromised routers cannot directly reach critical assets.
  • Embed SOHO router security into third-party risk and remote work policies, requiring regular firmware checks, provider-managed CPE options and documented replacement plans for EOL devices.

CVEs

CVE-2025-59367

Vendors

ASUS

Threats

Authentication bypassRouter compromise

Targets

Small and medium businessesHome officesRemote workers
Intelligence Source: CVE-2025-59367 - ASUS DSL router auth bypass risk | Nov 15, 2025