CVE-2025-59367: CWE-288: Authentication Bypass by Alternate Path or Channel in ASUS DSL-AC51
An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.
AI Analysis
Technical Summary
CVE-2025-59367 is an authentication bypass vulnerability classified under CWE-288, discovered in the ASUS DSL-AC51 router series. The vulnerability arises from an alternate path or channel in the router's authentication process, allowing remote attackers to circumvent normal authentication controls entirely. This means an attacker can gain unauthorized administrative or user-level access remotely without needing any credentials, privileges, or user interaction. The affected firmware versions are those prior to 1.1.2.3_1010. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The flaw does not require any special conditions such as physical access or prior authentication, making it highly exploitable. While no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. ASUS has acknowledged the issue and referenced a security update advisory, though no direct patch links are provided in the data. The vulnerability affects the router's core authentication mechanism, potentially enabling attackers to manipulate device settings, intercept traffic, or pivot into internal networks.
Potential Impact
The impact of CVE-2025-59367 is severe for organizations using the ASUS DSL-AC51 routers, especially those relying on them for critical network connectivity. Unauthorized access to the router can lead to full compromise of the device, allowing attackers to alter configurations, disable security features, intercept or redirect network traffic, and launch further attacks within the internal network. This can result in data breaches, loss of confidentiality, integrity violations, and denial of service. Since the vulnerability requires no authentication or user interaction and can be exploited remotely over the network, the attack surface is broad. Organizations in sectors such as telecommunications, small to medium enterprises, and residential users with these routers are at risk. The potential for attackers to establish persistent access or use the compromised routers as a foothold for lateral movement increases the threat to organizational security posture globally.
Mitigation Recommendations
To mitigate CVE-2025-59367, organizations should immediately verify if their ASUS DSL-AC51 routers are running affected firmware versions prior to 1.1.2.3_1010 and apply the official firmware update from ASUS as soon as it becomes available. Until patches are deployed, network administrators should restrict remote management access to trusted IP addresses only and disable any unnecessary remote administration interfaces such as WAN-side management or UPnP. Implement network segmentation to isolate DSL routers from critical internal networks and monitor network traffic for unusual access patterns or unauthorized configuration changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect attempts to exploit authentication bypass techniques. Regularly audit router configurations and access logs to identify potential compromise. Additionally, consider replacing affected hardware if firmware updates are not provided promptly or if devices are no longer supported. User education on the risks of default or outdated router firmware can also reduce exposure.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, Taiwan, Australia, Canada, Brazil
CVE-2025-59367: CWE-288: Authentication Bypass by Alternate Path or Channel in ASUS DSL-AC51
Description
An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59367 is an authentication bypass vulnerability classified under CWE-288, discovered in the ASUS DSL-AC51 router series. The vulnerability arises from an alternate path or channel in the router's authentication process, allowing remote attackers to circumvent normal authentication controls entirely. This means an attacker can gain unauthorized administrative or user-level access remotely without needing any credentials, privileges, or user interaction. The affected firmware versions are those prior to 1.1.2.3_1010. The vulnerability has been assigned a CVSS 4.0 score of 9.3, reflecting its critical nature with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). The flaw does not require any special conditions such as physical access or prior authentication, making it highly exploitable. While no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. ASUS has acknowledged the issue and referenced a security update advisory, though no direct patch links are provided in the data. The vulnerability affects the router's core authentication mechanism, potentially enabling attackers to manipulate device settings, intercept traffic, or pivot into internal networks.
Potential Impact
The impact of CVE-2025-59367 is severe for organizations using the ASUS DSL-AC51 routers, especially those relying on them for critical network connectivity. Unauthorized access to the router can lead to full compromise of the device, allowing attackers to alter configurations, disable security features, intercept or redirect network traffic, and launch further attacks within the internal network. This can result in data breaches, loss of confidentiality, integrity violations, and denial of service. Since the vulnerability requires no authentication or user interaction and can be exploited remotely over the network, the attack surface is broad. Organizations in sectors such as telecommunications, small to medium enterprises, and residential users with these routers are at risk. The potential for attackers to establish persistent access or use the compromised routers as a foothold for lateral movement increases the threat to organizational security posture globally.
Mitigation Recommendations
To mitigate CVE-2025-59367, organizations should immediately verify if their ASUS DSL-AC51 routers are running affected firmware versions prior to 1.1.2.3_1010 and apply the official firmware update from ASUS as soon as it becomes available. Until patches are deployed, network administrators should restrict remote management access to trusted IP addresses only and disable any unnecessary remote administration interfaces such as WAN-side management or UPnP. Implement network segmentation to isolate DSL routers from critical internal networks and monitor network traffic for unusual access patterns or unauthorized configuration changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect attempts to exploit authentication bypass techniques. Regularly audit router configurations and access logs to identify potential compromise. Additionally, consider replacing affected hardware if firmware updates are not provided promptly or if devices are no longer supported. User education on the risks of default or outdated router firmware can also reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ASUS
- Date Reserved
- 2025-09-15T01:36:47.357Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691543c7edb89fd9702216e4
Added to database: 11/13/2025, 2:34:47 AM
Last enriched: 2/27/2026, 5:42:49 AM
Last updated: 3/25/2026, 8:56:10 PM
Views: 432
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.