Description

ASUS confirmed a dangerous bug in its AiCloud-capable routers with word of an important security hazard posing a grave danger that, left unattended, could open systems to execution by remote assailants of unrestricted activities. Identifed as CVE-2025-2492, the weakness has earned it a CVSS rating of 9.2 out of a possible 10, earning the designation high-level severity. In accordance with ASUS, the issue arises due to inadequate authentication controls in some versions of the firmware, which are exploitable through specially crafted requests. This can potentially open doors for threat actors to acquire unauthorized access and control over impacted routers, creating considerable risks to privacy and network security of users. In an attempt to avert the risk, ASUS has distributed firmware patches containing the vulnerability over several branches: 3.0.0.4_382, 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102. Users are strongly encouraged to upgrade their routers to the most current firmware version as soon as possible to seal off this security loophole. Along with implementing the updates, ASUS has released best practice recommendations for password security. It is recommended that users establish unique passwords for both their wireless network and router admin pages, which must be at least 10 characters in length and contain a combination of uppercase letters, numbers, and symbols. The reuse of passwords or use of easily guessed sequences such as "1234567890" or "qwertyuiop" is strongly discouraged. For users who cannot implement the firmware updates right away or whose routers are at end-of-life (EoL), ASUS suggests some interim precautions. These involve disabling AiCloud and any services that can be accessed from the internet, including remote WAN access, port forwarding, Dynamic DNS (DDNS), VPN server capability, DMZ, port triggering, and FTP. Doing so can minimize the risk of exploitation until a more lasting solution can be applied. With increasing complexity and frequency of cyberattacks, staying updated with the latest firmware and following good cybersecurity hygiene are indispensable measures to ensure security for internet-of-things devices and domestic or office-level networks.