ASUS has disclosed a crucial safety flaw impacting routers with AiCloud enabled that might allow distant attackers to carry out unauthorized execution of features on inclined gadgets.
The vulnerability, tracked as CVE-2025-2492, has a CVSS rating of 9.2 out of a most of 10.0.
“An improper authentication management vulnerability exists in sure ASUS router firmware sequence,” ASUS said in an advisory. “This vulnerability could be triggered by a crafted request, probably resulting in unauthorized execution of features.”
The shortcoming has been addressed with firmware updates for the next branches –
- 3.0.0.4_382
- 3.0.0.4_386
- 3.0.0.4_388, and
- 3.0.0.6_102
For optimum safety, it is really useful to replace their situations to the newest model of the firmware.
“Use completely different passwords to your wi-fi community and router administration web page,” ASUS mentioned. “Use passwords which have a minimum of 10 characters, with a mixture of capital letters, numbers, and symbols.”
“Don’t use the identical password for multiple machine or service. Don’t use passwords with consecutive numbers or letters, resembling 1234567890, abcdefghij, or qwertyuiop.”
If instant patching shouldn’t be an possibility or the routers have reached end-of-life (EoL), it is suggested to be sure that login and Wi-Fi passwords are robust.
Another choice is to disable AiCloud and any service that may be accessed from the web, resembling distant entry from WAN, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP.
Source link