CVE-2025-59367
Published: 13 November 2025
Description
An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for…
more
more information.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the authentication bypass vulnerability by requiring timely remediation through application of ASUS firmware patches as specified in the security advisory.
Prevents authentication bypass via alternate paths by explicitly identifying, documenting, and restricting actions permissible without identification and authentication to only essential ones.
Enforces identification and authentication for non-organizational users, countering remote unauthenticated access to the router's critical administrative functions.
Security SummaryAI
CVE-2025-59367 is an authentication bypass vulnerability affecting certain DSL series routers from ASUS. Classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function), it enables remote attackers to circumvent authentication mechanisms and gain unauthorized access to the affected system. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for high impact on confidentiality, integrity, and availability.
Remote, unauthenticated attackers can exploit this vulnerability over the network without user interaction or privileges. Successful exploitation grants unauthorized access to the router's administrative functions, potentially allowing full control over the device, including configuration changes, data exfiltration, or use as a pivot for further network compromise.
The ASUS Security Advisory, referenced at https://www.asus.com/security-advisory, provides details on mitigation in its 'Security Update for DSL Series Router' section, which likely includes firmware patches or updates to address the issue. Security practitioners should consult this advisory for model-specific remediation steps and apply updates promptly.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in a public-facing DSL router management interface, enabling remote unauthenticated exploitation for initial access, directly mapping to T1190: Exploit Public-Facing Application.