CVE-2025-15101

Published: Mar 26, 2026 Last Modified: Mar 26, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,5
Source: 54bf65a7-a193-42d2-b1ba-8e150d3c35e1
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS router models. This vulnerability potentially allows actions to be performed with the existing privileges of an authenticated user on the affected device, including the ability to execute system commands through unintended mechanisms.
Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability Non-Repudiation
Potential Impacts:
Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart Read Files Or Directories Modify Files Or Directories Read Application Data Modify Application Data Hide Activities
Applicable Platforms
Technologies: AI/ML, Not Technology-Specific, Web Server
View CWE Details
352

Cross-Site Request Forgery (CSRF)

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability Non-Repudiation Access Control
Potential Impacts:
Gain Privileges Or Assume Identity Bypass Protection Mechanism Read Application Data Modify Application Data Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies: Web Based, Web Server
View CWE Details
https://www.asus.com/security-advisory/