{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59367","assignerOrgId":"54bf65a7-a193-42d2-b1ba-8e150d3c35e1","state":"PUBLISHED","assignerShortName":"ASUS","dateReserved":"2025-09-15T01:36:47.357Z","datePublished":"2025-11-13T02:09:55.309Z","dateUpdated":"2026-02-26T16:57:07.823Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"DSL-AC51","vendor":"ASUS","versions":[{"status":"affected","version":"Before 1.1.2.3_1010"}]},{"defaultStatus":"unaffected","product":"DSL-N16","vendor":"ASUS","versions":[{"status":"affected","version":"Before 1.1.2.3_1010"}]},{"defaultStatus":"unaffected","product":"DSL-AC750","vendor":"ASUS","versions":[{"status":"affected","version":"Before 1.1.2.3_1010"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.<br>"}],"value":"An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288: Authentication Bypass by Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"54bf65a7-a193-42d2-b1ba-8e150d3c35e1","shortName":"ASUS","dateUpdated":"2025-11-13T02:09:55.309Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.asus.com/security-advisory"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-59367","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-11-14T04:55:37.458221Z"}}}],"references":[{"url":"https://www.asus.com/security-advisory","tags":["exploit"]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:57:07.823Z"}}]}}