Asus
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Asus product.
RSS Feeds for Asus security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Asus products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Asus Sorted by Most Security Vulnerabilities since 2018
Known Exploited Asus Vulnerabilities
The following Asus vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| ASUS Live Update Embedded Malicious Code Vulnerability |
ASUS Live Update contains an embedded malicious code vulnerability client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. CVE-2025-59374 Exploit Probability: 31.8% |
December 17, 2025 |
| ASUS Routers Improper Authentication Vulnerability |
ASUS Lyra Mini and ASUS GT-AC2900 devices contain an improper authentication vulnerability that allows an attacker to gain unauthorized access to the administrative interface. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. CVE-2021-32030 Exploit Probability: 94.2% |
June 2, 2025 |
| ASUS RT-AX55 Routers OS Command Injection Vulnerability |
ASUS RT-AX55 devices contain a OS command injection vulnerability that could allow a remote, authenticated attacker to execute arbitrary commands. CVE-2023-39780 Exploit Probability: 42.7% |
June 2, 2025 |
The vulnerability CVE-2021-32030: ASUS Routers Improper Authentication Vulnerability is in the top 1% of the currently known exploitable vulnerabilities. 2 known exploited Asus vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.
By the Year
In 2026 there have been 6 vulnerabilities in Asus. Last year, in 2025 Asus had 21 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Asus in 2026 could surpass last years number.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 6 | 0.00 |
| 2025 | 21 | 0.00 |
| 2024 | 11 | 6.89 |
| 2023 | 14 | 7.65 |
| 2022 | 13 | 7.52 |
| 2021 | 4 | 7.60 |
| 2020 | 3 | 5.30 |
| 2019 | 3 | 9.30 |
| 2018 | 2 | 9.80 |
It may take a day or so for new Asus vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Asus Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-15101 | Mar 26, 2026 |
ASUS Router Web UI CSRF Enables Authenticated Privilege ActionsA Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS router models. This vulnerability potentially allows actions to be performed with the existing privileges of an authenticated user on the affected device, including the ability to execute system commands through unintended mechanisms. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-15038 | Mar 12, 2026 |
OOB Read in ASUS Business System Control Intf DriverAn Out-of-Bounds Read vulnerability exists in the ASUS Business System Control Interface driver. This vulnerability can be triggered by an unprivileged local user sending a specially crafted IOCTL request, potentially leading to a disclosure of kernel information or a system crash. Refer to the "Security Update for ASUS Business System Control Interface" section on the ASUS Security Advisory for more information. |
|
| CVE-2026-1878 | Mar 12, 2026 |
ASUS ROG Driver Race Condition Priv EscalationAn Insufficient Integrity Verification vulnerability in the ASUS ROG peripheral driver installation process allows privilege escalation to SYSTEM. The vulnerability is due to improper access control on the installation directory, which enables the exploitation of a race condition where the legitimate installer is substituted with an unexpected payload immediately after download, resulting in arbitrary code execution. Refer to the "Security Update for ASUS ROG peripheral driver" section on the ASUS Security Advisory for more information. |
|
| CVE-2025-15037 | Mar 12, 2026 |
ASUS Business System Control Interface IOCTL Perm EscalationAn Incorrect Permission Assignment vulnerability exists in the ASUS Business System Control Interface driver. This vulnerability can be triggered by an unprivileged local user sending a specially crafted IOCTL request, potentially leading to unauthorized access to sensitive hardware resources and kernel information disclosure. Refer to the "ASUS Business System Control Interface" section on the ASUS Security Advisory for more information. |
|
| CVE-2025-13348 | Feb 02, 2026 |
ASUS Secure Delete Driver Local File Creation via Improper Access ControlAn improper access control vulnerability exists in ASUS Secure Delete Driver of ASUS Business Manager. This vulnerability can be triggered by a local user sending a specially crafted request, potentially leading to the creation of arbitrary files in a specified path. Refer to the "Security Update for ASUS Business Manager" section on the ASUS Security Advisory for more information. |
|
| CVE-2025-12793 | Jan 06, 2026 |
Uncontrolled DLL Load in ASUS SoftwareManagerAgentAn uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker may influence the application to load a DLL from an attacker-controlled location, potentially resulting in arbitrary code execution. Refer to the ' Security Update for MyASUS' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59374 | Dec 17, 2025 |
ASUS Live Update Client Supply-Chain Compromise: Unauthorized Modifications"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue. |
|
| CVE-2025-11775 | Dec 17, 2025 |
ASUS asComSvc OOB Read in Armoury CrateAn out-of-bounds read vulnerability has been identified in the asComSvc service. This vulnerability can be triggered by sending specially crafted requests, which may lead to a service crash or partial loss of functionality. This vulnerability only affects ASUS motherboard series products. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-11901 | Dec 17, 2025 |
Uncontrolled Resource Consumption in ASUS UEFI Firmware via DMAAn uncontrolled resource consumption vulnerability affects certain ASUS motherboards using Intel B460, B560, B660, B760, H410, H510, H610, H470, Z590, Z690, Z790, W480, W680 series chipsets. Exploitation requires physical access to internal expansion slots to install a specially crafted device and supporting software utility, and may lead to uncontrolled resource consumption that increases the risk of unauthorized direct memory access (DMA). Refer to the 'Security Update for UEFI firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59372 | Nov 25, 2025 |
ASUS Router Firmware Path Traversal for Authenticated File WriteA path traversal vulnerability has been identified in certain router models. A remote, authenticated attacker could exploit this vulnerability to write files outside the intended directory, potentially affecting device integrity. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59371 | Nov 25, 2025 |
AUTH Bypass in Asus Router IFTTT Integration Remote Auth Attacker AccessAn authentication bypass vulnerability has been identified in the IFTTT integration feature. A remote, authenticated attacker could leverage this vulnerability to potentially gain unauthorized access to the device. This vulnerability does not affect Wi-Fi 7 series models. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59370 | Nov 25, 2025 |
Command Injection in ASUS bwdpi Router FirmwareA command injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary commands, leading to the device executing unintended instructions. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59369 | Nov 25, 2025 |
CVE-2025-59369: Authenticated SQLi in bwdpi of ASUS RouterA SQL injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary SQL queries, leading to unauthorized data access. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59368 | Nov 25, 2025 |
Integer Underflow in Aicloud (ASUS Router) Enables DoSAn integer underflow vulnerability has been identified in Aicloud. An authenticated attacker may trigger this vulnerability by sending a crafted request, potentially impacting the availability of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-12003 | Nov 25, 2025 |
ASUS Router WebDAV Path Traversal VULN Affects Device IntegrityA path traversal vulnerability has been identified in WebDAV, which may allow unauthenticated remote attackers to impact the integrity of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59365 | Nov 25, 2025 |
Auth Stack Buffer Overflow in ASUS Router FirmwareA stack buffer overflow vulnerability has been identified in certain router models. An authenticated attacker may trigger this vulnerability by sending a crafted request, potentially impacting the availability of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59366 | Nov 25, 2025 |
Auth Bypass in ASUS AiCloud via Samba FunctionalityAn authentication-bypass vulnerability exists in AiCloud. This vulnerability can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization. Refer to the Security Update for ASUS Router Firmware section on the ASUS Security Advisory for more information. |
|
| CVE-2025-59373 | Nov 25, 2025 |
Local Privilege Escalation in ASUS SysCtrl Interface Restore MechanismA local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyASUS in the ASUS Security Advisory. |
|
| CVE-2025-59367 | Nov 13, 2025 |
ASUS DSL Series Router Auth Bypass Remote AccessAn authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-9338 | Nov 06, 2025 |
ASUS Armoury Crate AsIO3.sys Local Privilege Escalation via Buffer OverflowA improper restriction of operations within the bounds of a memory buffer exists in AsIO3.sys driver. This vulnerability can be triggered by manually executing a specially crafted process, potentially leading to local privilage escalation. For additional information, please refer to the 'Security Update for Armoury Crate App' section of the ASUS Security Advisory. |
|
| CVE-2025-9337 | Oct 13, 2025 |
ASUS AsIO3.sys NPE Crash in Armoury CrateA null pointer dereference has been identified in the AsIO3.sys driver. The vulnerability can be triggered by a specially crafted input, which may lead to a system crash (BSOD). Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-9336 | Oct 13, 2025 |
Buffer Overflow in AsIO3.sys driver of Asus Armoury CrateA stack buffer overflow has been identified in the AsIO3.sys driver. This vulnerability can be triggered by input manipulation, may leading to a system crash (BSOD) or other potentially undefined execution. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-9968 | Oct 13, 2025 |
Armoury Crate UnifyScanner Link-Following PrivEsc VulnerabilityA link following vulnerability exists in the UnifyScanner component of Armoury Crate. This vulnerability may be triggered by creating a specially crafted junction, potentially leading to local privilege escalation. For more information, please refer to section 'Security Update for Armoury Crate App' in the ASUS Security Advisory. |
|
| CVE-2025-3464 | Jun 16, 2025 |
Armoury Crate Race Condition TTOU Auth Bypass (CVE-2025-3464)A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-1533 | May 12, 2025 |
ASIO3.sys Buffer Overflow in ASUS Armoury Crate DriverA stack buffer overflow has been identified in the AsIO3.sys driver. This vulnerability can be triggered by input manipulation, may leading to a system crash (BSOD) or other potentially undefined execution. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2025-2492 | Apr 18, 2025 |
ASUS AiCloud Improper Auth FlawAn improper authentication control vulnerability exists in AiCloud. This vulnerability can be triggered by a crafted request, potentially leading to unauthorized execution of functions. Refer to the 'ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information. |
|
| CVE-2024-12957 | Jan 23, 2025 |
Arbitrary File Deletion via File Handling in Armoury CrateA file handling command vulnerability in certain versions of Armoury Crate may result in arbitrary file deletion. Refer to the '01/23/2025 Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information. |
|
| CVE-2024-31162 | Jun 14, 2024 |
CVE-2024-31162: ASUS DM Unauth Remote Cmd Exec via Unfiltered ParamThe specific function parameter of ASUS Download Master does not properly filter user input. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. |
|
| CVE-2024-31163 | Jun 14, 2024 |
ASUS Download Master Buffer Overflow Enables Remote Code ExecASUS Download Master has a buffer overflow vulnerability. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device. |
|
| CVE-2024-31161 | Jun 14, 2024 |
ASUS Download Master UPLOAD flaw: Arbitrary File Upload with Admin PrivilegesThe upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage. |
|
| CVE-2024-31160 | Jun 14, 2024 |
ASUS DM Stored XSS via unsanitized paramThe parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Stored Cross-site scripting attacks. |
|
| CVE-2024-31159 | Jun 14, 2024 |
ASUS Download Master XSS via unsanitized parameterThe parameter used in the certain page of ASUS Download Master is not properly filtered for user input. A remote attacker with administrative privilege can insert JavaScript code to the parameter for Reflected Cross-site scripting attacks. |
|
| CVE-2024-33220 | May 22, 2024 |
ASUS AISuite3 3.03.36 Privilege Escalation via AslO3_64.sys IOCTLAn issue in the component AslO3_64.sys of ASUSTeK Computer Inc AISuite3 v3.03.36 3.03.36 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests. |
|
| CVE-2024-33219 | May 22, 2024 |
Privilege Escalation in ASUS SABERTOOTH X99 Driver v1.0.1.0 via AsIO64.sysAn issue in the component AsIO64.sys of ASUSTeK Computer Inc ASUS SABERTOOTH X99 Driver v1.0.1.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests. |
|
| CVE-2024-0401 | May 20, 2024 |
ASUS Router OVPN Profile Remote Code Execution (Authenticated)ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000. |
And others... |
| CVE-2023-35720 | May 03, 2024 |
ASUS RT-AX92U mod_webdav.so SQLi Info DisclosureASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected ASUS RT-AX92U routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mod_webdav.so module. When parsing a request, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-16078. |
|
| CVE-2024-26342 | Feb 28, 2024 |
Remote DoS via NPD in httpd on ASUS AC68U 3.0.0.4A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remote attackers to trigger DoS via network packet. |
|
| CVE-2023-5716 | Jan 19, 2024 |
ASUS Armoury Crate: Arbitrary File Write via HTTP (CVE-2023-5716)ASUS Armoury Crate has a vulnerability in arbitrary file write and allows remote attackers to access or modify arbitrary files by sending specific HTTP requests without permission. |
|
| CVE-2023-47678 | Nov 15, 2023 |
RT-AC87U Improper Access Control via TFTP Enables Arbitrary File AccessAn improper access control vulnerability exists in RT-AC87U all versions. An attacker may read or write files that are not intended to be accessed by connecting to a target device via tftp. |
|
| CVE-2023-39780 | Sep 11, 2023 |
OS Command Injection in ASUS RT-AX55 3.0.0.4.386.51598 QoS BW Rulelist (CVE-2023-39780)On ASUS RT-AX55 3.0.0.4.386.51598 devices, authenticated attackers can perform OS command injection via the /start_apply.htm qos_bw_rulelist parameter. NOTE: for the similar "token-generated module" issue, see CVE-2023-41345; for the similar "token-refresh module" issue, see CVE-2023-41346; for the similar "check token module" issue, see CVE-2023-41347; and for the similar "code-authentication module" issue, see CVE-2023-41348. |
|
| CVE-2023-26911 | Jul 26, 2023 |
ASUS SetupAsusServices v1.0.5.1 unquoted svc path -> local privilege escalation (Armoury Crate <5.3.ASUS SetupAsusServices v1.0.5.1 in Asus Armoury Crate v5.3.4.0 contains an unquoted service path vulnerability which allows local users to launch processes with elevated privileges. |
|
| CVE-2023-31195 | Jun 13, 2023 |
ASUS Router RT-AX3000 Session Hijack via Non-SEC cookie MITM (v < 3.0.0.4.388.23403)ASUS Router RT-AX3000 Firmware versions prior to 3.0.0.4.388.23403 uses sensitive cookies without 'Secure' attribute. When an attacker is in a position to be able to mount a man-in-the-middle attack, and a user is tricked to log into the affected device through an unencrypted ('http') connection, the user's session may be hijacked. |
|
| CVE-2023-34940 | Jun 12, 2023 |
Asus RT-N10LX Router v2.0.0.39 Stack Overflow via /start-apply.html URLAsus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the url parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2023-34942 | Jun 12, 2023 |
Stack Overflow in Asus RTN10LX Router v2.0.0.39 via mac paramAsus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the mac parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2023-34941 | Jun 12, 2023 |
Stored XSS in Asus RT-N10LX v2.0.0.39 urlFilterList (router)A stored cross-site scripting (XSS) vulnerability in the urlFilterList function of Asus RT-N10LX Router v2.0.0.39 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL Keyword List text field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2023-28703 | Jun 02, 2023 |
ASUS RT-AC86U cgi Stack-Based Buffer Overflow (BOV)ASUS RT-AC86Us specific cgi function has a stack-based buffer overflow vulnerability due to insufficient validation for network packet header length. A remote attacker with administrator privileges can exploit this vulnerability to execute arbitrary system commands, disrupt system or terminate service. |
|
| CVE-2023-29772 | May 02, 2023 |
XSS in ASUS RT-AC51U Admin UI Log Page Prior to 3.0.0.4.380.8591A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request. |
|
| CVE-2023-26602 | Feb 26, 2023 |
ASUS ASMB8 iKVM firmware <=1.14.51 SNMP Extend RCE VulnerabilityASUS ASMB8 iKVM firmware through 1.14.51 allows remote attackers to execute arbitrary code by using SNMP to create extensions, as demonstrated by snmpset for NET-SNMP-EXTEND-MIB with /bin/sh for command execution. |
|
| CVE-2022-42455 | Feb 15, 2023 |
ASUS EC Tool Driver (d.sys) Priv Esc via Unprivileged IOCTLASUS EC Tool driver (aka d.sys) 1beb15c90dcf7a5234ed077833a0a3e900969b60be1d04fcebce0a9f8994bdbb, as signed by ASUS and shipped with multiple ASUS software products, contains multiple IOCTL handlers that provide raw read and write access to port I/O and MSRs via unprivileged IOCTL calls. Local users can gain privileges. |
|
| CVE-2021-37316 | Feb 03, 2023 |
ASUS RTAC68U Cloud Disk SQLi before 3.0.0.4.386.41634SQL injection vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to view sensitive information via /etc/shadow. |
|