Original Article Text

Click to Toggle View

ASUS warns of new critical auth bypass flaw in AiCloud routers. ASUS has released new firmware to patch nine security vulnerabilities, including a critical authentication bypass flaw in routers with AiCloud enabled. AiCloud is a cloud-based remote access feature that comes with many ASUS routers, turning them into private cloud servers for remote media streaming and cloud storage. As the Taiwanese electronics manufacturer explained, the CVE-2025-59366 vulnerability "can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization." Remote attackers without privileges can exploit it by chaining a path traversal and an OS command injection weakness in low-complexity attacks that don't require user interaction. "To protect your devices, ASUS strongly recommends that all users update their router firmware to the latest version immediately," the company said in a Monday advisory. "Update your router with the newest firmware. We encourage you to do this when new firmware becomes available." 3.0.0.4_386 series 3.0.0.4_388 series 3.0.0.6_102 series While ASUS didn't specify which router models are affected and only mentioned which firmware versions address the vulnerability, it provided mitigation measures for users with end-of-life models that will not receive firmware updates. To block potential attacks without patching their routers, users are advised to disable any services accessible from the Internet, including remote access from WAN, port forwarding, DDNS, VPN server, DMZ, port triggering, and FTP, as well as to cut remote access to devices running AiCloud software vulnerable to CVE-2025-59366 attacks. ASUS also advised taking additional measures to reduce the attack surface and secure the routers against potential attacks, including using strong passwords for the router administration page and wireless networks. In April, ASUS patched another critical authentication bypass flaw (CVE-2025-2492) that can be triggered by a crafted request targeting routers with AiCloud enabled. Along with six other security vulnerabilities, CVE-2025-2492 has been exploited to hijack thousands of ASUS WRT routers in a global campaign called Operation WrtHug, which targeted end-of-life or outdated devices from Taiwan and across Southeast Asia, Russia, Central Europe, and the United States. SecurityScorecard researchers who spotted the attacks believe the hijacked routers may be used as operational relay boxes (ORB) in Chinese hacking operations, as stealth relay nodes for proxying and hiding command-and-control infrastructure. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // ASUS Releases Critical Firmware Updates for AiCloud Router Flaws

ASUS has issued new firmware to address nine security vulnerabilities, including a critical authentication bypass flaw affecting routers with AiCloud enabled.

The CVE-2025-59366 flaw can be exploited through Samba functionality, allowing unauthorized execution of specific functions via low-complexity attacks.

ASUS advises immediate firmware updates to protect devices, particularly for routers using the 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102 firmware series.

For end-of-life models, ASUS recommends disabling internet-accessible services and enhancing security with strong passwords to mitigate risks.

A previous flaw, CVE-2025-2492, was exploited in Operation WrtHug, targeting outdated ASUS routers globally, potentially for Chinese hacking operations.

SecurityScorecard researchers suggest hijacked routers may serve as relay nodes, concealing command-and-control infrastructures.

This situation underscores the critical need for timely firmware updates and proactive security measures to safeguard network devices.