轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202511-00000204
[內容說明]
研究人員發現ASUS部分DSL型號路由器存在身分鑑別繞過(Authentication Bypass)漏洞(CVE-2025-59367)。
未經身分鑑別之遠端攻擊者可透過此漏洞,對受影響設備執行未經授權之存取,請儘速確認並進行修補。
[影響平台]
DSL-AC51
DSL-AC750
DSL-N16
[建議措施]
官方已針對漏洞釋出修復更新,請更新至以下版本:
ASUS DSL-AC51 Firmware 1.1.2.3_1010版本
ASUS DSL-AC750 Firmware 1.1.2.3_1010版本
ASUS DSL-N16 Firmware 1.1.2.3_1010版本
官方針對已停止支援(EOL)之設備提出安全建議,請參考官方說明,網址如下: https://www.asus.com/security-advisory
[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-59367
2. https://www.asus.com/security-advisory
Forwarded from the National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202511-00000204
[Content Description]
Researchers have discovered an authentication bypass vulnerability (CVE-2025-59367) in some ASUS DSL router models.
Unauthenticated remote attackers could exploit this vulnerability to perform unauthorized access to affected devices. Please confirm and patch it as soon as possible.
[Affected Platforms]
DSL-AC51
DSL-AC750
DSL-N16
[Recommended Actions]
The official firmware has released a patch for this vulnerability. Please update to the following versions:
ASUS DSL-AC51 Firmware 1.1.2.3_1010
ASUS DSL-AC750 Firmware 1.1.2.3_1010
ASUS DSL-N16 Firmware 1.1.2.3_1010
The official firmware provides security advice for devices that have reached End-of-Life (EOL) support. Please refer to the official documentation at: https://www.asus.com/security-advisory
[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-59367
2. https://www.asus.com/security-advisory