Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks

Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks

Posted on May 12, 2025May 12, 2025 By CWS

Two vulnerabilities in DriverHub, a driver software program that comes pre-installed on Asus motherboards, could be exploited remotely for arbitrary code execution, New Zealand researcher ‘MrBruh’ says.

The problems, tracked as CVE-2025-3462 (CVSS rating of 8.4) and CVE-2025-3463 (CVSS rating of 9.4) might be exploited through crafted HTTP requests to work together with DriverHub.

In line with Asus, the issues are the results of an absence of enough validation and might be exploited to work together with the software program’s options and have an effect on system habits, respectively. The corporate additionally says that “laptops, desktop computer systems, or different endpoints” aren’t affected by these bugs.

MrBruh, nevertheless, explains that the safety defects could be exploited for distant code execution, and that they exist in the way in which the pre-installed software program receives and executes packages.

DriverHub runs within the background, speaking with driverhub.asus.com to inform customers of the drivers that ought to be put in or up to date. It depends on the distant process name (RPC) protocol and hosts an area service to which the web site can join through API requests.

In line with MrBruh, whereas DriverHub would solely settle for RPC requests from driverhub.asus.com, switching the origin – to ‘driverhub.asus.com.*’ – would permit an unauthorized person to ship requests to it.

Moreover, the motive force’s UpdateApp endpoint would settle for crafted URL parameters (in the event that they contained ‘.asus.com’), save a file with a specified title, obtain any file with any extension, robotically execute signed information with administrative privileges, and never delete information that fail the signature test.

Trying right into a standalone Wi-Fi driver that was distributed in a ZIP archive, MrBruh found that it was potential to focus on the UpdateApp endpoint with an exploit leveraging a silent set up characteristic to execute any file.Commercial. Scroll to proceed studying.

The researcher demonstrated how the vulnerabilities could be exploited for one-click distant code execution by getting the focused person to go to a malicious webpage hosted on a driverhub.asus.com.* subdomain.

MrBruh reported the vulnerabilities on April 8 and Asus rolled out fixes for them on Might 9. The researcher says he has not seen any area with driverhub.asus.com.* registered, “that means it’s unlikely that this was being actively exploited” earlier than his report.

“I requested Asus in the event that they supplied bug bounties. They responded saying they don’t, however they might as an alternative put my title of their ‘corridor of fame’,” MrBruh notes.

Associated: Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

Associated: Second OttoKit Vulnerability Exploited to Hack WordPress Websites

Associated: Vital Vulnerability in AI Builder Langflow Beneath Assault

Associated: Vital Commvault Vulnerability in Attacker Crosshairs

Security Week News Tags:ASUS, Attacks, Code, DriverHub, Execution, Expose, Remote, Users, Vulnerabilities

Post navigation

Previous Post: US Deportation Airline GlobalX Confirms Hack
Next Post: 437,000 Impacted by Ascension Health Data Breach

Related Posts

Zafran Security Raises  Million in Series C Funding Zafran Security Raises $60 Million in Series C Funding Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
AI-Driven Breach Exposes FortiGate Firewalls Globally AI-Driven Breach Exposes FortiGate Firewalls Globally Security Week News
Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities Security Week News
In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Samsung Announces Security Improvements for Galaxy Smartphones Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark