Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59367: CWE-288: Authentication Bypass by Alternate Path or Channel in ASUS DSL-AC51

0
Critical
VulnerabilityCVE-2025-59367cvecve-2025-59367cwe-288
Published: Thu Nov 13 2025 (11/13/2025, 02:09:55 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: DSL-AC51

Description

An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:42:49 UTC

Technical Analysis

CVE-2025-59367 is an authentication bypass vulnerability classified under CWE-288, discovered in the ASUS DSL-AC51 router series. The vulnerability arises from an alternate path or channel in the router's authentication process, allowing remote attackers to circumvent normal authentication controls entirely. This means an attacker can gain unauthorized administrative or user-level access remotely without needing any credentials, privileges, or user interaction. The affected firmware versions are those prior to 1.1.2.3_1010. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The flaw does not require any special conditions such as physical access or prior authentication, making it highly exploitable. While no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. ASUS has acknowledged the issue and referenced a security update advisory, though no direct patch links are provided in the data. The vulnerability affects the router's core authentication mechanism, potentially enabling attackers to manipulate device settings, intercept traffic, or pivot into internal networks.

Potential Impact

The impact of CVE-2025-59367 is severe for organizations using the ASUS DSL-AC51 routers, especially those relying on them for critical network connectivity. Unauthorized access to the router can lead to full compromise of the device, allowing attackers to alter configurations, disable security features, intercept or redirect network traffic, and launch further attacks within the internal network. This can result in data breaches, loss of confidentiality, integrity violations, and denial of service. Since the vulnerability requires no authentication or user interaction and can be exploited remotely over the network, the attack surface is broad. Organizations in sectors such as telecommunications, small to medium enterprises, and residential users with these routers are at risk. The potential for attackers to establish persistent access or use the compromised routers as a foothold for lateral movement increases the threat to organizational security posture globally.

Mitigation Recommendations

To mitigate CVE-2025-59367, organizations should immediately verify if their ASUS DSL-AC51 routers are running affected firmware versions prior to 1.1.2.3_1010 and apply the official firmware update from ASUS as soon as it becomes available. Until patches are deployed, network administrators should restrict remote management access to trusted IP addresses only and disable any unnecessary remote administration interfaces such as WAN-side management or UPnP. Implement network segmentation to isolate DSL routers from critical internal networks and monitor network traffic for unusual access patterns or unauthorized configuration changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect attempts to exploit authentication bypass techniques. Regularly audit router configurations and access logs to identify potential compromise. Additionally, consider replacing affected hardware if firmware updates are not provided promptly or if devices are no longer supported. User education on the risks of default or outdated router firmware can also reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.357Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691543c7edb89fd9702216e4

Added to database: 11/13/2025, 2:34:47 AM

Last enriched: 2/27/2026, 5:42:49 AM

Last updated: 3/25/2026, 8:56:10 PM

Views: 432

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses