GreyNoise mentioned its in-house AI device, SIFT, flagged suspicious visitors geared toward disabling and exploiting a TrendMicro-powered safety function, AiProtection, enabled by default on Asus routers.
Trojanizing the security web
Asus’ AiProtection, developed with TrendMicro, is a built-in, enterprise-grade safety suite for its routers, providing real-time menace detection, malware blocking, and intrusion prevention utilizing cloud-based intelligence.
After gaining administrative entry on the routers, both by brute-forcing or exploiting recognized authentication bypass vulnerabilities of “login.cgi” — a web-based admin interface, the attackers exploit an authenticated command injection flaw (CVE-2023-39780) to create an empty file at /tmp/BWSQL_LOG.
Doing this prompts the BWDPI (Bidirectional Internet Information Packet Inspection) logging function, a part of Asus’ AiProtection suite geared toward inspecting incoming and outgoing visitors. With logging turned on, attackers can feed crafted (malicious) payloads into the router’s visitors, as BWDPI will not be meant to deal with arbitrary information.
On this explicit case, the attackers use this to allow SSH on a non-standard port and add their very own keys, making a stealthy backdoor. “As a result of this secret is added utilizing the official Asus options, this config change is persevered throughout firmware upgrades,” GreyNoise researchers mentioned. “In case you’ve been exploited beforehand, upgrading your firmware will NOT take away the SSH backdoor.”
Whereas GreyNoise didn’t specify a selected CVE used as an authentication bypass for preliminary entry, Asus not too long ago acknowledged a crucial authentication bypass vulnerability, tracked as CVE-2025-2492, affecting routers with the AiCloud function enabled.