A severe security flaw rated 9.2 out of 10 has been identified in Asus routers running AiCloud. The vulnerability allows remote attackers to send specially crafted requests and execute unauthorized functions on affected devices. Asus has issued an urgent firmware update to address the risk and is urging users to take immediate action.
CVE-2025-2492 Enables Unauthorized Access on Asus AiCloud Routers
According to Asus, the vulnerability lies in improper authentication control in specific router firmware versions. In a security advisory, the company stated:
“An improper authentication control vulnerability exists in certain ASUS router firmware series. This vulnerability can be triggered by a crafted request, potentially leading to unauthorized execution of functions.”
The flaw is tracked as CVE-2025-2492 and impacts some of the latest Asus networking hardware, particularly firmware versions:
- 3.0.0.4_382
- 3.0.0.4_386
- 3.0.0.4_388
- 3.0.0.6_102
While it’s not confirmed whether the flaw is being actively exploited, the company urges customers to update immediately:
“Update your router with the newest firmware,” the advisory continues.
Asus Recommends Immediate Mitigation for At-Risk Devices
For users who cannot immediately update their routers or whose devices are end-of-life, Asus recommends disabling AiCloud and all internet-facing services. These include:
- Remote access from WAN
- Port forwarding
- DDNS
- VPN server
- DMZ
- Port triggering
- FTP
Additional Security Practices Suggested by Asus
Asus also advises securing both wireless and router admin credentials. According to the advisory:
“Use passwords that are at least 10 characters long and contain a mix of capital letters, numbers, and symbols. Do not use the same password for more than one device or service. Do not use passwords with consecutive numbers or letters, such as 1234567890, abcdefghij, or qwertyuiop.”
Firmware updates can be found on the official Asus support site.