Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges

Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges

Posted on November 21, 2025November 21, 2025 By CWS

A essential safety vulnerability has been found in ASUSTOR backup and synchronization software program, permitting attackers to execute malicious code with elevated system privileges.

The flaw, tracked as CVE-2025-13051, impacts two extensively used ASUSTOR functions and poses a big danger to customers operating outdated variations.

The DLL Hijacking Vulnerability

The vulnerability stems from a DLL hijacking weak spot that happens when ASUSTOR Backup Plan (ABP) and ASUSTOR EZSync (AES) providers are put in in directories accessible to non-administrative customers.

Attackers can exploit this flaw by changing professional dynamic hyperlink library (DLL) recordsdata with malicious variations that share the identical filename as these loaded by the service.

When the affected service restarts, the malicious DLL is routinely loaded and executed.

FieldDetailsCVE IDCVE-2025-13051SeverityCriticalCVSS 4.0 Score9.3Attack VectorLocalAffected ProductsABP ≤2.0.7.9050, AES ≤1.0.6.8290

Beneath the LocalSystem account, granting attackers unauthorized code execution with the very best stage of system privileges.

Such a assault can result in full system compromise, permitting risk actors to put in malware, steal delicate information, or set up fixed backdoor entry.

The bug impacts ABP model 2.0.7.9050 and all older variations, and AES model 1.0.6.8290 and all earlier releases.

ASUSTOR has launched safety patches to deal with this essential flaw. Customers ought to instantly improve to ABP model 2.0.7.10171 or greater, and to AES model 1.1.0.10312 or greater, to guard their methods from potential exploitation.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ASUSTOR, Attackers, Code, Critical, Elevated, Execute, Malicious, Privileges, Vulnerability

Post navigation

Previous Post: Salesforce Instances Hacked via Gainsight Integrations
Next Post: Runlayer Emerges From Stealth Mode With $11 Million in Funding

Related Posts

Hackers Weaponizing SVG Files to Stealthily Deliver Malicious Payloads Hackers Weaponizing SVG Files to Stealthily Deliver Malicious Payloads Cyber Security News
Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Cyber Security News
20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Cyber Security News
China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News