Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59371: CWE-330: Use of Insufficiently Random Values in ASUS Router

0
High
VulnerabilityCVE-2025-59371cvecve-2025-59371cwe-330
Published: Tue Nov 25 2025 (11/25/2025, 07:30:34 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Router

Description

An authentication bypass vulnerability has been identified in the IFTTT integration feature. A remote, authenticated attacker could leverage this vulnerability to potentially gain unauthorized access to the device. This vulnerability does not affect Wi-Fi 7 series models. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:40:34 UTC

Technical Analysis

CVE-2025-59371 is an authentication bypass vulnerability categorized under CWE-330, which involves the use of insufficiently random values. This weakness exists in the IFTTT integration feature of ASUS routers running firmware versions 3.0.0.4_386, 3.0.0.4_388, and 3.0.0.6_102. The vulnerability allows a remote attacker who already has some level of authenticated access to bypass authentication controls, potentially gaining unauthorized administrative access to the router. The root cause is the generation or use of predictable or insufficiently random values during the authentication process within the IFTTT feature, undermining the security mechanisms designed to protect device access. Exploitation does not require user interaction but does require prior authentication, which could be obtained through credential compromise or insider threat. The vulnerability does not affect the newer Wi-Fi 7 series ASUS routers, indicating a fix or architectural change in those models. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability, making this a serious threat. No public exploits are reported yet, but the potential for unauthorized device control could lead to network compromise, data interception, or disruption of services. ASUS has acknowledged the issue and referenced firmware updates in their security advisory, though no direct patch links were provided in the data.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. ASUS routers are widely used in both enterprise and small-to-medium business environments across Europe, often serving as critical network gateways. Exploitation could allow attackers to gain administrative control over routers, enabling interception or manipulation of network traffic, deployment of further malware, or disruption of internet connectivity. This could impact confidentiality by exposing sensitive data, integrity by allowing unauthorized configuration changes, and availability by causing network outages. Critical infrastructure sectors such as finance, healthcare, and government agencies using affected ASUS models could face heightened risks. The requirement for prior authentication reduces the likelihood of random external attacks but increases the threat from insider attackers or those who have compromised credentials. The absence of known exploits currently provides a window for mitigation, but the high severity score demands prompt action to prevent potential exploitation.

Mitigation Recommendations

European organizations should immediately verify if their ASUS routers run the affected firmware versions (3.0.0.4_386, 3.0.0.4_388, 3.0.0.6_102) and prioritize upgrading to the latest firmware, especially versions beyond those listed or the Wi-Fi 7 series which are not affected. If firmware updates are not immediately available, disable the IFTTT integration feature entirely to eliminate the attack surface. Implement strict access controls to router management interfaces, including network segmentation and limiting administrative access to trusted personnel only. Enforce strong, unique credentials and consider multi-factor authentication where supported to reduce the risk of credential compromise. Monitor router logs for unusual authentication attempts or configuration changes indicative of exploitation attempts. Additionally, conduct regular security audits of network devices and educate staff on the risks of credential reuse and phishing attacks that could lead to initial authentication compromise. Engage with ASUS support channels to obtain official patches and advisories promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be065d

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 12/2/2025, 2:40:34 PM

Last updated: 1/10/2026, 10:14:36 PM

Views: 176

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats