Critical Authentication Bypass Vulnerability Exposes ASUS DSL Routers to Remote Takeover
Share this article
In the ever-evolving landscape of cybersecurity threats, a critical vulnerability has emerged in networking equipment that forms the backbone of countless home and small office networks. ASUS has recently released firmware updates to address a severe authentication bypass flaw in several of its DSL series routers, a weakness that could potentially expose thousands of devices to remote takeover.
The Vulnerability: Silent Entry into Network Infrastructure
Tracked as CVE-2025-59367, this security flaw represents a significant threat because it allows remote, unauthenticated attackers to bypass login mechanisms and gain administrative access to affected routers. What makes this particularly concerning is the low complexity of the attack vector—no user interaction is required, meaning the vulnerability can be exploited automatically against any unpatched device exposed to the internet.
"An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system," ASUS explains in their security advisory.
The affected models include the DSL-AC51, DSL-N16, and DSL-AC750 routers. To address this critical issue, ASUS has released firmware version 1.1.2.3_1010, which users are urged to install immediately.
Beyond the Patch: Mitigation Strategies for All Users
Recognizing that not all users can update their firmware immediately—whether due to technical constraints or end-of-life status—ASUS has provided a set of mitigation measures to reduce the attack surface. These include:
- Disabling all services accessible from the internet, including:
- Remote access from WAN
- Port forwarding
- DDNS
- VPN server
- DMZ
- Port triggering
- FTP
Additionally, ASUS recommends several best practices to enhance router security:
- Complex Passwords: Use strong, unique passwords for both the router administration interface and wireless networks
- Regular Updates: Routinely check for security updates and new firmware
- Credential Hygiene: Avoid reusing credentials across different services
Historical Context: A Pattern of Router Vulnerabilities
While there are currently no reports of active exploitation of CVE-2025-59367, this vulnerability is part of a concerning pattern in ASUS router security history. In June 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added two older ASUS router vulnerabilities to its catalog of actively exploited vulnerabilities:
- CVE-2023-39780 in ASUS RT-AX55 routers
- CVE-2021-32030 in ASUS GT-AC2900 routers
According to research by GreyNoise and Sekoia, a sophisticated threat actor known as Vicious Trap leveraged these vulnerabilities to backdoor thousands of ASUS routers, building a botnet dubbed AyySSHush. This botnet was then used for various malicious activities, including large-scale DDoS attacks.
The Bigger Picture: Why Router Security Matters
Routers serve as the gateway between local networks and the internet, making them prime targets for attackers. Compromised routers can be used to:
- Intercept network traffic
- Launch attacks against other systems
- Create botnets for DDoS campaigns
- Steal sensitive information
The stakes are particularly high in an era where remote work has expanded the attack surface of home networks. Many users remain unaware of the critical role their routers play in overall network security.
A Call to Action for Network Administrators
For IT professionals and network administrators responsible for multiple devices, this vulnerability serves as a reminder of the importance of:
- Implementing robust network segmentation
- Regularly auditing firmware versions across all network equipment
- Establishing clear patch management procedures
- Monitoring for unusual network behavior that might indicate compromise
The recent patch for CVE-2025-59367 follows another critical authentication bypass vulnerability (CVE-2025-2492) that ASUS patched in April, affecting a wide range of router models with the AiCloud service enabled. This pattern suggests that router manufacturers must continue to prioritize security in their development processes.
As our digital infrastructure becomes increasingly interconnected, the security of foundational networking equipment takes on greater importance. The timely patching of vulnerabilities like CVE-2025-59367 is not just a matter of device security—it's an essential component of maintaining the integrity of our broader digital ecosystem.