Router Security Warning: CERT-In Advisory India Flags Critical Flaw in Asus Wi-Fi Routers

Key Points

  • Router Security Warning: CERT-In Advisory India alerts users about a severe authentication bypass flaw in select Asus DSL routers.

  • Router Security Warning: CERT-In Advisory India warns that attackers could access router settings, intercept data and compromise connected devices.

  • Router Security Warning: CERT-In Advisory India recommends immediate firmware updates, strong passwords and disabling remote access.


Router Security Warning: CERT-In Advisory India

A major Router Security Warning has been issued through the latest CERT-In Advisory India, highlighting a critical vulnerability in select Asus DSL series Wi-Fi routers used widely in Indian homes and small offices. The warning states that a newly discovered authentication bypass flaw, tracked as CVE-2025-59367, could allow remote attackers to access and control affected routers without any permission or interaction from the user. This makes the vulnerability particularly severe because routers act as the central gateway for internet traffic in a household or office, meaning any compromise can expose sensitive personal and professional information. Many families, small businesses, and remote-working employees rely on these models, increasing the urgency of the advisory. The government’s cybersecurity agency notes that hackers could misuse the flaw to intercept online activities, alter router settings, or even gain access to smartphones, laptops, and smart home devices connected to the same Wi-Fi network.

The CERT-In Advisory India stresses that this vulnerability is serious because routers often remain unchanged for years, running outdated firmware while continuing to manage high volumes of sensitive data. Many users are unaware that routers require regular updates just like mobile phones and laptops. When an attacker bypasses authentication, they can enter the router interface unchallenged and make changes silently in the background. This includes modifying DNS settings, redirecting users to fake websites, spying on browsing habits, capturing login details, or injecting harmful scripts into network traffic. The Router Security Warning is therefore not just about device malfunction—it is a threat that could compromise the entire digital environment inside a home or workplace. CERT-In’s warning also notes that the attack surface is large because these Asus models, such as the DSL-AC51, DSL-N16, and DSL-AC750, are popular entry-level routers used across India for budget home internet setups and small offices.


Router Security Warning: CERT-In Advisory India

The next section of the CERT-In Advisory India breaks down the risks in more detail. According to the advisory, the flaw impacts three core pillars of cybersecurity: confidentiality, integrity and availability. Router Security Warning implications are serious because attackers who exploit this flaw can steal private data travelling across the router, make unauthorised configuration changes, and even lock out the legitimate user. For instance, hackers could monitor your browsing activity or read sensitive information like passwords typed on banking or email websites. Because routers also control traffic for smart TVs, smart cameras, IoT sensors, voice assistants and work-from-home setups, a compromised device can expose security feeds, personal photos, email accounts, or even office VPN connections. The CERT-In Advisory India notes that attackers can also use the router as a base to launch larger cyberattacks, meaning the victim’s network could unknowingly become a tool for cybercriminals.

Another major danger highlighted in the Router Security Warning is the ability of attackers to redirect users to fraudulent websites. For example, a person trying to visit their bank website may unknowingly be sent to a fake page designed to steal login details. This technique, called DNS hijacking, is one of the most common results of router compromise. The CERT-In Advisory India says this makes the risk extremely high for individuals who carry out financial transactions, online shopping or sensitive work operations over the affected routers. The warning also adds that this flaw can be exploited remotely, meaning the attacker does not need to be on the same Wi-Fi network. They can launch attacks over the internet if the router’s remote management feature is enabled. This type of remote exploitation dramatically increases the threat because many users keep remote access turned on without realising it, especially in office settings where technicians access routers from outside.


Router Security Warning: CERT-In Advisory India

In its final guidance section, the CERT-In Advisory India provides a detailed set of instructions for users of the affected Asus routers. The first and most important step is to update the router firmware immediately. Asus has already released patches to fix the flaw, and these can be downloaded directly from its website. Without installing this firmware update, the router remains open to attacks even if passwords are changed or remote access is disabled. The Router Security Warning emphasises that users must never ignore firmware updates, as they often contain critical fixes that protect against emerging cyber threats. After updating, users should manually restart the router and verify that the new version has installed correctly by checking the firmware information in the router’s settings page. CERT-In further advises users to keep automatic update notifications enabled to avoid missing future security patches.

Apart from updating firmware, the CERT-In Advisory India outlines several best-practice measures. Users should disable remote access unless absolutely necessary, because this is the easiest route for attackers to exploit the flaw from outside the network. The Router Security Warning also recommends immediately changing default usernames and passwords, as many people continue using factory-set credentials that are easily guessed or publicly available. Users should create strong, unique passwords that combine letters, numbers, and symbols. Additionally, CERT-In urges users to check router logs regularly for suspicious activity such as repeated login attempts or unknown IP addresses accessing the interface. The advisory also suggests turning off unused features, enabling WPA3 or WPA2 security for Wi-Fi networks, and isolating unknown devices from the primary network. These steps add extra layers of protection while ensuring that even if attackers gain some access, they cannot compromise all connected devices. Finally, the Router Security Warning reminds users to keep all smartphones, laptops and smart devices updated so that even if a compromised router exposes their data, the device-level security can still block deeper attacks.