Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS Router

0
High
VulnerabilityCVE-2025-59370cvecve-2025-59370cwe-78
Published: Tue Nov 25 2025 (11/25/2025, 07:30:09 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Router

Description

A command injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary commands, leading to the device executing unintended instructions. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:46:04 UTC

Technical Analysis

CVE-2025-59370 is an OS command injection vulnerability classified under CWE-78, identified in the bwdpi component of ASUS routers running firmware versions 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102. This vulnerability allows a remote attacker with authenticated access and high privileges to inject and execute arbitrary operating system commands on the affected device. The flaw arises from improper neutralization of special elements in OS commands, enabling unintended command execution. The vulnerability does not require user interaction but does require authentication with elevated privileges, indicating that an attacker must first compromise or have legitimate access to the device's administrative interface. The CVSS v4.0 score is 7.5, reflecting high severity due to the potential for significant impact on confidentiality, integrity, and availability of the router and connected networks. Exploitation could lead to full device compromise, enabling attackers to manipulate network traffic, intercept sensitive data, or disrupt network services. Although no known exploits have been reported in the wild, the presence of this vulnerability in widely deployed ASUS routers poses a substantial risk. The vulnerability was publicly disclosed on November 25, 2025, with no immediate patch links provided, emphasizing the need for vigilance and proactive mitigation by affected users and organizations.

Potential Impact

The impact of CVE-2025-59370 on organizations worldwide can be significant. Successful exploitation allows attackers to execute arbitrary commands on ASUS routers, potentially leading to full device compromise. This can result in unauthorized network traffic manipulation, interception of sensitive communications, disruption of network availability, and pivoting to internal networks for further attacks. Given the critical role routers play in network infrastructure, this vulnerability threatens confidentiality, integrity, and availability of enterprise and home networks alike. Organizations relying on affected ASUS router models for perimeter defense or internal segmentation face increased risk of data breaches and operational disruption. The requirement for authenticated access somewhat limits exploitation scope but does not eliminate risk, as attackers may leverage phishing, credential theft, or insider threats to gain necessary privileges. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future active exploitation. The vulnerability's high severity and potential for widespread impact necessitate urgent attention, especially in sectors with high-value data or critical infrastructure dependencies.

Mitigation Recommendations

To mitigate CVE-2025-59370, organizations should implement the following specific measures: 1) Immediately inventory and identify all ASUS routers running affected firmware versions (3.0.0.4_386, 3.0.0.4_388, 3.0.0.6_102). 2) Monitor ASUS official channels for firmware updates addressing this vulnerability and apply patches promptly upon release. 3) Restrict administrative access to routers by limiting management interfaces to trusted IP addresses and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 4) Regularly audit and rotate administrative credentials to reduce risk of compromise. 5) Employ network segmentation to isolate critical assets from devices with potential vulnerabilities. 6) Enable and monitor router logging for unusual command execution or access patterns indicative of exploitation attempts. 7) Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous router behavior or command injection attempts. 8) Educate network administrators on the risks of command injection vulnerabilities and best practices for secure router management. These targeted actions go beyond generic advice by focusing on access control, monitoring, and rapid patch management specific to this vulnerability and affected devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be065a

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 2/27/2026, 6:46:04 AM

Last updated: 3/25/2026, 3:00:12 AM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses