Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59367: CWE-288: Authentication Bypass by Alternate Path or Channel in ASUS DSL-AC51

0
Critical
VulnerabilityCVE-2025-59367cvecve-2025-59367cwe-288
Published: Thu Nov 13 2025 (11/13/2025, 02:09:55 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: DSL-AC51

Description

An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 11/20/2025, 04:43:04 UTC

Technical Analysis

CVE-2025-59367 is an authentication bypass vulnerability classified under CWE-288, affecting the ASUS DSL-AC51 router series. The flaw arises from the device's authentication mechanism allowing an attacker to circumvent normal authentication procedures by exploiting an alternate path or communication channel. This bypass enables remote attackers to gain unauthorized access to the router's administrative interface or internal systems without any user credentials, privileges, or interaction. The vulnerability affects firmware versions prior to 1.1.2.3_1010. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low complexity, no authentication, and no user interaction, resulting in high confidentiality, integrity, and availability impacts. This means attackers can potentially control the device, manipulate configurations, intercept or redirect traffic, and disrupt network services. Although no exploits have been reported in the wild yet, the critical severity and ease of exploitation make this a high-priority vulnerability. ASUS has published a security advisory recommending firmware updates to address the issue, but no direct patch links are provided in the data. The vulnerability's presence in widely deployed consumer and small business routers increases the attack surface, especially in environments where these devices serve as gateways to internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-59367 could be severe. Unauthorized access to DSL-AC51 routers can lead to full compromise of network perimeter devices, enabling attackers to intercept sensitive communications, modify network configurations, or launch further attacks against internal systems. This could result in data breaches, loss of confidentiality, integrity violations, and denial of service conditions. Small and medium enterprises (SMEs) and home office setups relying on these routers are particularly vulnerable due to often limited network segmentation and security monitoring. Critical infrastructure sectors using these devices as part of their network infrastructure could face operational disruptions or espionage risks. The high severity and remote exploitability without authentication increase the likelihood of targeted attacks or opportunistic scanning by threat actors. Additionally, the lack of known exploits in the wild does not diminish the urgency, as proof-of-concept exploits could emerge rapidly once the vulnerability is public. European organizations must consider the potential regulatory and compliance implications related to data protection laws such as GDPR if breaches occur due to this vulnerability.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should verify the firmware version of their ASUS DSL-AC51 routers and upgrade to version 1.1.2.3_1010 or later as soon as the patch becomes available from ASUS. 2. Network segmentation: Isolate DSL routers from critical internal networks to limit the impact of potential compromise. 3. Disable remote management: If remote administration is enabled on the router, disable it to reduce the attack surface. 4. Monitor network traffic: Implement network monitoring to detect unusual access patterns or unauthorized configuration changes on routers. 5. Access control: Restrict management interface access to trusted IP addresses or VPN connections only. 6. Incident response readiness: Prepare to respond quickly to any signs of exploitation, including logs review and device resets. 7. Vendor communication: Maintain contact with ASUS for updates, patches, and advisories related to this vulnerability. 8. Alternative hardware consideration: Evaluate replacing vulnerable routers with devices from vendors with stronger security track records if patching is delayed or unsupported. These steps go beyond generic advice by focusing on immediate firmware verification, network architecture adjustments, and proactive monitoring tailored to the vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.357Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691543c7edb89fd9702216e4

Added to database: 11/13/2025, 2:34:47 AM

Last enriched: 11/20/2025, 4:43:04 AM

Last updated: 12/28/2025, 12:08:37 PM

Views: 307

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats