Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59369: CWE-89: Improper Neutralization of Special Elements used in an SQLCommand ('SQL Injection') in ASUS Router

0
Medium
VulnerabilityCVE-2025-59369cvecve-2025-59369cwe-89
Published: Tue Nov 25 2025 (11/25/2025, 07:29:38 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Router

Description

CVE-2025-59369 is a medium-severity SQL injection vulnerability affecting certain ASUS router firmware versions. It allows a remote attacker with authenticated access to execute arbitrary SQL commands via the bwdpi component, potentially leading to unauthorized data access. Exploitation requires high privileges and no user interaction is needed. The vulnerability affects firmware versions 3. 0. 0. 4_386, 3. 0. 0. 4_388, and 3.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:54:11 UTC

Technical Analysis

CVE-2025-59369 is a SQL injection vulnerability identified in the bwdpi component of ASUS routers running firmware versions 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102. The vulnerability arises from improper neutralization of special elements in SQL commands, classified under CWE-89. An attacker with authenticated access and high privileges can remotely inject arbitrary SQL queries, potentially compromising the confidentiality and integrity of the router's internal data stores. The vulnerability does not require user interaction but does require the attacker to have authenticated access, limiting the attack surface to insiders or those who have obtained credentials. The CVSS 4.0 score is 5.9 (medium severity), reflecting the moderate ease of exploitation combined with significant impact on data confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability could allow unauthorized data access, which might include sensitive configuration or user data stored on the device. Given the role of routers as network gateways, exploitation could facilitate further lateral movement or persistent access within a network. The vulnerability was reserved on 2025-09-15 and published on 2025-11-25. ASUS has issued a security advisory but no direct patch links were provided in the source data. Organizations should monitor ASUS advisories for firmware updates addressing this issue.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of network infrastructure managed via affected ASUS routers. Unauthorized SQL command execution could expose sensitive configuration data, user credentials, or network topology information, potentially enabling further attacks such as network intrusion or data exfiltration. Critical sectors relying on these routers for secure communications—such as government agencies, financial institutions, and telecommunications providers—could face operational disruptions or data breaches. The requirement for authenticated access reduces the likelihood of external attackers exploiting this vulnerability directly; however, insider threats or compromised credentials increase risk. Additionally, given the widespread use of ASUS routers in small and medium enterprises across Europe, the vulnerability could be leveraged to pivot into larger corporate networks. The absence of known exploits currently limits immediate impact, but the medium severity rating indicates a need for proactive mitigation to prevent future exploitation.

Mitigation Recommendations

1. Apply official firmware updates from ASUS as soon as they are released to address CVE-2025-59369. 2. Restrict administrative access to the router interface by limiting it to trusted IP addresses or VPN connections, reducing the attack surface for authenticated attackers. 3. Enforce strong, unique passwords and implement multi-factor authentication for router management accounts to prevent credential compromise. 4. Regularly audit router logs for unusual SQL query patterns or unauthorized access attempts indicative of exploitation attempts. 5. Segment network infrastructure to isolate critical systems from devices running vulnerable firmware, limiting lateral movement opportunities. 6. Disable or limit the use of the bwdpi component if feasible until patches are applied, reducing exposure. 7. Educate network administrators on the risks of SQL injection vulnerabilities and the importance of timely patch management. 8. Employ network intrusion detection systems (NIDS) tuned to detect anomalous traffic patterns related to SQL injection attempts on router management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.357Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be0657

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 12/2/2025, 2:54:11 PM

Last updated: 1/10/2026, 10:15:09 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats