Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59372: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ASUS Router

0
Medium
VulnerabilityCVE-2025-59372cvecve-2025-59372cwe-22
Published: Tue Nov 25 2025 (11/25/2025, 07:30:54 UTC)
Source: CVE Database V5
Vendor/Project: ASUS
Product: Router

Description

A path traversal vulnerability has been identified in certain router models. A remote, authenticated attacker could exploit this vulnerability to write files outside the intended directory, potentially affecting device integrity. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

AI-Powered Analysis

AILast updated: 11/25/2025, 07:59:45 UTC

Technical Analysis

CVE-2025-59372 is a path traversal vulnerability classified under CWE-22, discovered in certain ASUS router firmware versions (3.0.0.4_386, 3.0.0.4_388, 3.0.0.6_102). The flaw allows a remote attacker with authenticated access to bypass directory restrictions and write files outside the designated directories on the device's filesystem. This improper limitation of pathname can lead to unauthorized file modifications, potentially affecting the router's configuration, firmware integrity, or enabling persistence mechanisms for further attacks. The vulnerability requires the attacker to have high-level privileges (authenticated with elevated rights) but does not require user interaction. The CVSS v4.0 score is 6.9 (medium severity), reflecting network attack vector, low attack complexity, no user interaction, and high impact on integrity and availability. No known exploits have been reported in the wild as of the publication date (November 25, 2025). The vulnerability could be leveraged to alter critical system files, disrupt router operations, or facilitate further compromise of the network environment. The affected firmware versions are widely deployed in consumer and enterprise environments, making timely patching critical. ASUS has acknowledged the issue and recommends applying security updates as detailed in their advisory. This vulnerability highlights the risks associated with insufficient input validation and access control in embedded network devices.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network perimeter security, especially for those relying on ASUS routers in critical infrastructure, enterprise, or SME environments. Exploitation could lead to unauthorized modification of router configurations or firmware, potentially resulting in network outages, interception or redirection of traffic, and persistence of malicious code within the network. The integrity and availability of network services could be compromised, impacting business continuity and data confidentiality. Given the medium severity and requirement for authenticated access, the threat is more pronounced in environments where administrative credentials are weak, reused, or exposed. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks. European organizations with remote management enabled or insufficient network segmentation are particularly vulnerable. The impact extends to regulatory compliance concerns under GDPR if network compromise leads to personal data breaches.

Mitigation Recommendations

1. Immediately verify if your ASUS routers are running affected firmware versions (3.0.0.4_386, 3.0.0.4_388, 3.0.0.6_102) and prioritize upgrading to patched firmware as soon as ASUS releases updates. 2. Restrict administrative access to routers by limiting management interfaces to trusted networks and using VPNs or secure tunnels for remote access. 3. Enforce strong, unique passwords and implement multi-factor authentication for router administration to reduce the risk of credential compromise. 4. Regularly audit router configurations and logs for unauthorized changes or suspicious activity indicative of exploitation attempts. 5. Segment network infrastructure to isolate critical systems from devices with potential vulnerabilities. 6. Disable unnecessary services and remote management features on routers to minimize attack surface. 7. Employ network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns that could indicate exploitation attempts. 8. Educate IT staff on the risks of path traversal vulnerabilities and the importance of timely patch management in embedded devices. 9. Maintain an inventory of network devices and their firmware versions to streamline vulnerability management processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASUS
Date Reserved
2025-09-15T01:36:47.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be0660

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 11/25/2025, 7:59:45 AM

Last updated: 11/25/2025, 8:59:54 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats