ASUS warns of a critical authentication vulnerability in AiCloud routers.

ASUS warns of a critical authentication vulnerability in AiCloud routers.

Severity: CRITICAL (CVE-2025-59366)

CVSS v4.0 Score : 9.2

Information
 
ASUS AiCloud is a personal cloud service that lets you connect to and access your data anytime, anywhere by turning your ASUS router into a personal cloud server. It works with USB storage devices connected to the router to stream files, back up data, and share files via the AiCloud mobile app (iOS/Android) or through a web link. 

Incident

  CVE-2025-59366 is an authentication bypass vulnerability in AiCloud. This flaw may be caused by an unintended side effect of the Samba function, which could allow certain features to be accessed without proper authorization.

          ASUS has released new firmware to fix nine security vulnerabilities, including a critical authentication bypass in routers with AiCloud enabled.AiCloud is a remote cloud access feature included in many ASUS routers, which turns the routers into personal cloud servers for remote media streaming and cloud-based data storage.

          

          According to ASUS, the CVE-2025-59366 vulnerability may result from unintended side effects of Samba functionality, potentially allowing unauthorized actions.A remote, unauthenticated attacker can exploit this flaw through path traversal and OS command injection attacks. These attack methods are low complexity and do not require user interaction.

         

          Although there are currently no reports of active exploitation of CVE-2025-2492, such attacks are commonly used to install malware or enlist devices into botnets for DDoS attacks. Therefore, ASUS router users are strongly advised to upgrade to the latest firmware as soon as possible.

Recommendation

          It is recommended to update your router to the latest released firmware.

The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
061 387 9439 (Ms.Sirilak)
092 257 6902 (Ms.Narusorn)
063 197 7510 
(Mr.Yanotai)
065 725 7405 (Ms.Nattharini)

References

Weekly Interesting CVE

NO.

CVE Name

Published Date

Last Update

Device/Appplication/OS Target

Attack Type

CVSS
Severity Rating

Detail

Solution

Reference

1

CVE-2025-13597

25/11/2025

25/11/2025

AI Feeds Plugin for WordPress <= 1.0.11

Arbitrary File Upload / Remote Code Execution (RCE)

9.8

Unauthenticated attackers can exploit the actualizador_git.php file to download arbitrary GitHub repositories and overwrite existing plugin files. This allows for the injection of malicious scripts, leading to Remote Code Execution (RCE) and full website compromise.

Update the AI Feeds plugin to the latest version (newer than 1.0.11) or uninstall it immediately if no patch is available.

 

https://nvd.nist.gov/vuln/detail/CVE-2025-13597

2

CVE-2025-59366

25/11/2025

25/11/2025

ASUS Router Firmware (AiCloud feature

Authentication Bypass

10.0

(Critical Auth Bypass) This vulnerability arises from Samba functionality, allowing attackers to bypass authentication and access critical router functions without logging in. If the feature is enabled, it can lead to full device control or unauthorized access to AiCloud data.

Update to the latest firmware or temporarily disable the AiCloud feature.

https://www.cvedetails.com/cve/CVE-2025-59366/

3

CVE-2025-12977

24/11/2025

25/11/2025

Fluent Bit (Input Plugins: in_http, in_splunk, in_elasticsearch)

Path Traversal / Arbitrary File Write

8.7

Attackers can compromise log data integrity via Path Traversal in the tag_key parameter. This enables Arbitrary File Write, allowing attackers to overwrite critical files or configurations, which may escalate to Remote Code Execution (RCE). Additionally, it allows for log misrouting or log injection.

Update Fluent Bit to version 4.1.0 or later and ensure strict input validation for the tag_key parameter.

https://www.cvedetails.com/cve/CVE-2025-12977/

 

 4

CVE-2025-62691

25/11/2025

25/11/2025

MaLion (Windows) < 7.1.1.9, MaLionCloud < 7.2.0.1

Stack-based Buffer Overflow (RCE)

5.3

Attackers can send a specially crafted HTTP request to trigger a Buffer Overflow. This allows for unauthenticated remote code execution (RCE) with SYSTEM privileges, potentially leading to full system compromise.

Update MaLion Security Point (Windows) to version 7.1.1.9 or later, and MaLionCloud to version 7.2.0.1 or later.

https://www.cvedetails.com/cve/CVE-2025-62691/

5

CVE-2024-47856

24/11/2025

25/11/2025

RSA Authentication Agent for Microsoft Windows < 7.4.7

Path Interception / Unquoted Service Path

9.2

(Local Privilege Escalation) The vulnerability is caused by an unquoted service path in the Agent, which may lead Windows to execute an unintended executable. Attackers can exploit this by placing a malicious file in the path to execute code with SYSTEM privileges.

Update to RSA Authentication Agent version 7.4.7 or later.

https://nvd.nist.gov/vuln/detail/CVE-2024-47856


Malware News or Campaign IOC/IOA | EN

No

Campaign Name

Detection Date

Attack

Type

 

Description

 

Mitigation/Remediation

1

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access​

24/11/2025

Remote Code Execution​

Hackers are reportedly exploiting a critical vulnerability in Windows Server Update Services (WSUS) to continue distributing the ShadowPad malware. This follows the release of a proof-of-concept (PoC) vulnerability, codenamed CVE-2025-59287, which allows attackers to “execute arbitrary code on a machine,” giving them complete control over the server if they haven’t patched Microsoft’s recently released patch. Once compromised, hackers use PowerShell to gain control over the machine and then download the ShadowPad malware using commands like certutil and curl. ShadowPad is a highly sophisticated “backdoor” malware capable of evading detection and remaining invisible on the machine. It uses DLL side-loading techniques to disguise itself as a legitimate file. Worryingly, this malware is linked to state-sponsored hacking groups and is commonly used to target large organizations, particularly critical infrastructure and organizations. Experts warn that the number of attacks following the release of the PoC has increased rapidly, and the severity is expected to continue to increase unless organizations promptly patch and patch their WSUS systems.​

  • Avoid clicking on suspicious links or downloading software from untrusted sources.​
  • The organization conducts regular awareness training for all employees.​

Ref: https://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.html

09 December 2025

Viewed 220 time

Engine by shopup.com