Tuesday, April 29, 2025
HomeCVE/vulnerabilityASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

Published on

SIEM as a Service

Follow Us on Google News

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy.

These flaws highlight the continuous challenges in securing IoT and networking devices against increasingly sophisticated cyber threats.

Overview of the Vulnerability

The most pressing concern involves a series of remote code execution (RCE) vulnerabilities in ASUS routers.

- Advertisement - Google News

These vulnerabilities allow attackers to gain unauthorized access and control over affected devices by exploiting improper input validation, authentication bypass, and other security weaknesses.

Successful exploitation of these flaws could enable attackers to:

  • Execute arbitrary commands on the router.
  • Gain administrative control.
  • Intercept, alter, or redirect network traffic.
  • Use the compromised router as a foothold for further attacks within a network.

ASUS has actively responded by releasing firmware updates and encourages users to apply these patches immediately to mitigate risks.

ASUS has publicly disclosed numerous Common Vulnerabilities and Exposures (CVEs) related to these router flaws.

Below is a table summarizing key CVEs along with affected products to assist users and network administrators in identifying vulnerable devices and prioritizing security updates:

CVE IdentifierDescriptionAffected ASUS Router ModelsDisclosure Date
CVE-2024-3912Remote Code Execution via improper input validationDSL-N12U_C1, DSL-N12U_D1, DSL-N14U, DSL-N14U_B1, DSL-N16, DSL-N17U, DSL-N55U_C1, DSL-N55U_D1, DSL-N66U, DSL-AC51, DSL-AC750, DSL-AC52U, DSL-AC55U, DSL-AC56U2024-01-22
CVE-2024-3079Authentication bypass in router web interfaceXT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U2024-06-14
CVE-2024-3080Command injection vulnerabilityXT8, XT8_V2, RT-AX88U, RT-AX58U, RT-AX57, RT-AC86U, RT-AC68U2024-06-14
CVE-2024-0401Security bypass allowing elevated privilegesXT8, XT8_V2, RT-AX88U, RT-AX86U, RT-AX58U, RT-AX57, RT-AX55, RT-AC86U, RT-AC68U2024-05-29
CVE-2023-41345 to CVE-2023-41348Multiple RCE and privilege escalation flawsRT-AX552023-11-03

ASUS has a dedicated security advisory portal (https://www.asus.com/securityadvisory/) where users can report vulnerabilities and download firmware updates.

The company emphasizes responsible reporting and confidentiality of security issues during investigation.

  • Regularly check for and install the latest firmware updates released by ASUS.
  • Change default router passwords and use strong, unique credentials.
  • Disable remote management features if not necessary.
  • Monitor network activity for unusual behavior.
  • Segment networks to limit exposure if a device is compromised.

ASUS continues to prioritize security through prompt updates and communication with its user community.

The company also provides detailed lists of affected products along with fixed issues for transparency and user awareness.

The recent wave of ASUS router vulnerabilities underscores the importance of timely patching and proactive network security practices.

With critical CVEs allowing remote code execution already public, users must act swiftly to update their devices and protect their home or enterprise networks from potential cyberattacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...