The flaw, designated CVE-2025-2492 and assigned a CVSS v4 score of 9.2 (Critical), is an improper authentication control vulnerability in multiple ASUS router firmware series that support AiCloud, the company’s proprietary cloud-based remote access feature.
AiCloud allows users to access files on USB drives connected to their routers from anywhere, stream media, and sync files across networks and cloud services.
A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to the affected router.
Due to the improper authentication check, the router may process the request without verifying the sender’s credentials, enabling unauthorized execution of functions on the device.
This means an attacker could gain control over the router, access sensitive files, or use the device as a launchpad for further attacks.
ASUS has released patched firmware for all affected models and strongly urges users to upgrade immediately. The company’s security advisory states:
Recommended Actions:
While there are currently no public reports of active exploitation or proof-of-concept code in the wild, vulnerabilities of this class are frequently targeted by attackers for malware distribution, data theft, or to conscript devices into botnets for distributed denial-of-service (DDoS) attacks.
This incident comes as ASUS continues to strengthen its security practices, having been recognized as a CVE Numbering Authority (CNA) in 2024, allowing it to assign CVE identifiers and publish vulnerability records for its products.
The company emphasizes responsible disclosure and rapid response to security issues, maintaining a dedicated security advisory portal and encouraging customers to report vulnerabilities responsibly.
With the critical nature of CVE-2025-2492, ASUS router users—especially those utilizing AiCloud—must act swiftly to patch their devices.
Failure to do so could expose home and business networks to severe risks, including unauthorized access, data breaches, and network compromise.
For ongoing protection, users should maintain up-to-date firmware, practice strong password management, and disable unnecessary remote features.
For more information and step-by-step update instructions, visit the official ASUS Product Security Advisory page.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Critical ASUS Router Flaw Allows Remote Execution of Malicious Code appeared first on Cyber Security News.
Universal Pictures is inviting audiences to embark on a “digital odyssey” for director Christopher Nolan’s…
The Dungeon Crawler Carl series has been experiencing a whirlwind of a year so far…
Heads up: The massive 77" LG Evo C5 4K OLED Smart TV just dropped to…
After months of concerns regarding 007 First Light's performance, IO Interactive has confirmed the upcoming…
The Fast & Furious universe is getting not one, but a whopping four shows at…
Self-described 'friendslop' game Gamble With Your Friends has reached 1 million copies sold just one…
This website uses cookies.