ASUS confirmed a dangerous bug in its AiCloud-capable routers with word of an important security hazard posing a grave danger that, left unattended, could open systems to execution by remote assailants of unrestricted activities. Identifed as CVE-2025-2492, the weakness has earned it a CVSS rating of 9.2 out of a possible 10, earning the designation high-level severity. In accordance with ASUS, the issue arises due to inadequate authentication controls in some versions of the firmware, which are exploitable through specially crafted requests. This can potentially open doors for threat actors to acquire unauthorized access and control over impacted routers, creating considerable risks to privacy and network security of users. In an attempt to avert the risk, ASUS has distributed firmware patches containing the vulnerability over several branches: 3.0.0.4_382, 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102. Users are strongly encouraged to upgrade their routers to the most current firmware version as soon as possible to seal off this security loophole. Along with implementing the updates, ASUS has released best practice recommendations for password security. It is recommended that users establish unique passwords for both their wireless network and router admin pages, which must be at least 10 characters in length and contain a combination of uppercase letters, numbers, and symbols. The reuse of passwords or use of easily guessed sequences such as "1234567890" or "qwertyuiop" is strongly discouraged. For users who cannot implement the firmware updates right away or whose routers are at end-of-life (EoL), ASUS suggests some interim precautions. These involve disabling AiCloud and any services that can be accessed from the internet, including remote WAN access, port forwarding, Dynamic DNS (DDNS), VPN server capability, DMZ, port triggering, and FTP. Doing so can minimize the risk of exploitation until a more lasting solution can be applied. With increasing complexity and frequency of cyberattacks, staying updated with the latest firmware and following good cybersecurity hygiene are indispensable measures to ensure security for internet-of-things devices and domestic or office-level networks.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...