【資安漏洞預警】ASUS DSL路由器存在高風險安全漏洞(CVE-2025-59367),請儘速確認並進行修補
[Security Vulnerability Alert] ASUS DSL routers have a high-risk security vulnerability (CVE-2025-59367). Please confirm and patch it as soon as possible.

發布單位:圖資處數位服務組
日期範圍:2025/12/1 ~ 2026/6/1
 
發布單位:圖資處數位服務組
日期範圍:2025/12/1 ~ 2026/6/1
行政 行政公告
全體

轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202511-00000204

[內容說明]
研究人員發現ASUS部分DSL型號路由器存在身分鑑別繞過(Authentication Bypass)漏洞(CVE-2025-59367)。
未經身分鑑別之遠端攻擊者可透過此漏洞,對受影響設備執行未經授權之存取,請儘速確認並進行修補。

[影響平台]
DSL-AC51
DSL-AC750
DSL-N16

[建議措施]
官方已針對漏洞釋出修復更新,請更新至以下版本:
ASUS DSL-AC51 Firmware 1.1.2.3_1010版本
ASUS DSL-AC750 Firmware 1.1.2.3_1010版本
ASUS DSL-N16 Firmware 1.1.2.3_1010版本

官方針對已停止支援(EOL)之設備提出安全建議,請參考官方說明,網址如下: https://www.asus.com/security-advisory

[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-59367
2. https://www.asus.com/security-advisory

Forwarded from the National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202511-00000204

[Content Description]
Researchers have discovered an authentication bypass vulnerability (CVE-2025-59367) in some ASUS DSL router models.

Unauthenticated remote attackers could exploit this vulnerability to perform unauthorized access to affected devices. Please confirm and patch it as soon as possible.

[Affected Platforms]
DSL-AC51
DSL-AC750
DSL-N16

[Recommended Actions]
The official firmware has released a patch for this vulnerability. Please update to the following versions:
ASUS DSL-AC51 Firmware 1.1.2.3_1010
ASUS DSL-AC750 Firmware 1.1.2.3_1010
ASUS DSL-N16 Firmware 1.1.2.3_1010

The official firmware provides security advice for devices that have reached End-of-Life (EOL) support. Please refer to the official documentation at: https://www.asus.com/security-advisory

[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2025-59367
2. https://www.asus.com/security-advisory


相關附件
system_update_alt參考資料1
system_update_alt參考資料2
Top↑