Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

AiCloud Vulnerability Exposed: The Critical ASUS Firmware Patch




A critical vulnerability has been discovered in ASUS routers with AiCloud enabled, allowing attackers to bypass authentication and gain unauthorized access to sensitive data. The vulnerability, tracked as CVE-2025-59366, has a CVSS score of 9.2, indicating its high severity. ASUS has released new firmware to address the issue, recommending that all customers update their router firmware to the latest version immediately. Users are advised to take proactive steps to secure their devices and protect against potential exploitation.

  • Pierluigi Paganini reported a critical vulnerability (CVE-2025-59366) in AiCloud feature of ASUS routers with CVSS score 9.2.
  • ASUS has released new firmware to address multiple vulnerabilities, including the critical authentication bypass flaw.
  • AiCloud can be triggered by an unintended side effect of Samba functionality, potentially leading to unauthorized execution.
  • ASUS recommends disabling internet-facing services and using strong passwords for router login and WiFi.
  • A recent campaign (Operation WrtHug) compromised tens of thousands of outdated ASUS routers worldwide targeting AiCloud service.
  • The incident highlights the importance of regular firmware updates, secure configuration practices, and prioritizing security in IoT devices.



  • Pierluigi Paganini, a renowned cybersecurity expert, recently reported on a critical vulnerability in the AiCloud feature of ASUS routers. This vulnerability, tracked as CVE-2025-59366, has been assigned a CVSS score of 9.2, indicating its high severity and potential impact.



    ASUS has released new firmware to address multiple vulnerabilities, including this critical authentication bypass flaw in routers with AiCloud enabled. The company has issued an advisory warning users about the vulnerability and recommending that all customers update their router firmware to the latest version immediately.



    AiCloud is a remote access feature built into many ASUS routers, allowing devices to function as personal cloud servers for remote media streaming and cloud storage. The critical authentication bypass vulnerability in AiCloud can be triggered by an unintended side effect of the Samba functionality, potentially leading to the execution of specific functions without proper authorization.



    The company has provided mitigations for customers using end-of-life models, including the usage of strong, unique passwords for both router login and WiFi. Additionally, ASUS recommends disabling all internet-facing services, such as AiCloud, WAN remote access, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP, to reduce exposure and improve security.



    Recently, a new campaign called Operation WrtHug has compromised tens of thousands of outdated or end-of-life ASUS routers worldwide, mainly in Taiwan, the U.S., and Russia, pulling them into a large malicious network. Threat actors exploited multiple ASUS router vulnerabilities, including OS command injection (CVE-2023-41345 to CVE-2023-41348), arbitrary command execution (CVE-2024-12912), and improper authentication (CVE-2025-2492), targeting the AiCloud service for initial access.



    The recent discovery of this critical vulnerability in AiCloud highlights the importance of regular firmware updates and secure configuration practices. ASUS's proactive response to this issue demonstrates its commitment to addressing security concerns and protecting its customers' devices.



    Furthermore, the incident serves as a reminder that IoT devices, such as routers, can be vulnerable to exploitation due to various factors, including outdated software, weak passwords, and inadequate security measures. As the number of connected devices continues to grow, it is essential for manufacturers and users alike to prioritize security and take proactive steps to prevent vulnerabilities like this from being exploited.



    In conclusion, the critical AiCloud vulnerability exposed by ASUS highlights the importance of regular firmware updates and secure configuration practices. The company's response demonstrates its commitment to addressing security concerns and protecting its customers' devices. Users are advised to update their router firmware to the latest version and take steps to reduce exposure and improve security.





    Related Information:
  • https://www.ethicalhackingnews.com/articles/AiCloud-Vulnerability-Exposed-The-Critical-ASUS-Firmware-Patch-ehn.shtml

  • https://securityaffairs.com/185109/iot/new-asus-firmware-patches-critical-aicloud-vulnerability.html

  • https://www.bleepingcomputer.com/news/security/asus-warns-of-new-critical-auth-bypass-flaw-in-aicloud-routers/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-59366

  • https://www.cvedetails.com/cve/CVE-2025-59366/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-41345

  • https://www.cvedetails.com/cve/CVE-2023-41345/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-41346

  • https://www.cvedetails.com/cve/CVE-2023-41346/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-41347

  • https://www.cvedetails.com/cve/CVE-2023-41347/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-41348

  • https://www.cvedetails.com/cve/CVE-2023-41348/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-12912

  • https://www.cvedetails.com/cve/CVE-2024-12912/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-2492

  • https://www.cvedetails.com/cve/CVE-2025-2492/


  • Published: Thu Nov 27 02:46:01 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us