[CIVN-2025-0322] Authentication Bypass Vulnerability in ASUS

By Published On: November 18, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Authentication Bypass Vulnerability in ASUS 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Systems Affected
ASUS DSL Series Routers
DSL-AC51
DSL-N16
DSL-AC750
Overview
A vulnerability has been reported in ASUS DSL series routers that allows a remote attackers to gain unauthorized access into the affected system.
Target Audience:
IT and Network Administrators, SOC Analysts,Small and Medium-Sized Business (SMB),Home / SOHO Users, Managed Service Providers (MSPs) / ISPs
Risk Assessment:
Critical risks on confidentiality, integrity, and availability of the systems.
 
Impact Assessment:
Compromise of integrity and confidentiality.
Description
ASUS DSL-series is a line of integrated modem-router devices designed for home and small office environments using DSL (Digital Subscriber Line) internet connections.
A vulnerability exists in  ASUS DSL series routers that may enable remote attackers to bypass security controls and gain unauthorized system access.
Successful exploitation of this vulnerability could allow a remote attacker to Gain unauthorized access, Modify configuration settings, Access sensitive information transmitted through the router and compromise the connected devices.
Solution
Apply appropriate security updates as mentioned in:
https://www.asus.com/security-advisory
Vendor Information
ASUS
https://www.asus.com/security-advisory
References
ASUS
https://www.asus.com/security-advisory
CVE Name
CVE-2025-59367
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=zY8x
—–END PGP SIGNATURE—–

Share this article