You are currently viewing WrtHug Abuse of ASUS WRT Vulnerabilities Exposes Thousands of EoL Routers

WrtHug Abuse of ASUS WRT Vulnerabilities Exposes Thousands of EoL Routers

  • Post author:
  • Reading time:5 mins read

Operation WrtHug refers to a widespread compromise of end-of-life (EoL) ASUS routers, where attackers exploit previously disclosed vulnerabilities to gain control over large numbers of unsupported devices. The activity has impacted tens of thousands of systems, with most cases identified in Taiwan, the United States, and Russia. Current assessments suggest that the operation may be associated with China-linked threat actors, underscoring the persistent security risks posed by outdated network infrastructure that no longer receives firmware updates.

Operation WrtHug is a wide-scale compromise of unsupported or end-of-life (EoL) ASUS WRT routers, identified by SecurityScorecard’s STRIKE team. The intrusion leverages unpatched flaws in ASUS WRT firmware to gain privileged access, primarily through the misuse of the proprietary AiCloud remote storage service. Once access is obtained, attackers deploy persistent control mechanisms that survive reboot cycles and firmware updates, leaving devices vulnerable to long-term unauthorized use.

Affected routers span multiple discontinued AC-series and AX-series models, with infections most prevalent in Taiwan, the United States, and Russia, along with additional cases reported in Southeast Asia and Europe. The compromised devices share a unique self-signed TLS certificate created in April 2022 and valid for 100 years, making it a reliable indicator for identifying infected systems at scale. This demonstrates a growing pattern of threat actors exploiting outdated network infrastructure, where unsupported edge devices provide long-term, low-visibility access points for unauthorized operations.

Operation WrtHug begins by exploiting command injection weaknesses and other known flaws affecting ASUS WRT routers, particularly older AC-series and AX-series devices. The attackers make extensive use of ASUS AiCloud, a proprietary cloud-access service, to gain high-privilege execution and deploy persistent control.

The table below details the key CVEs, their impacts, and prerequisites:

CVE IDImpactExploit PrerequisitesCVSS Score
CVE-2023-41345OS command injectionAuthenticated access, token module flaw8.8
CVE-2023-41346OS command injectionAuthenticated access, token module flaw8.8
CVE-2023-41347OS command injectionAuthenticated access, token module flaw8.8
CVE-2023-41348OS command injectionAuthenticated access, token module flaw8.8
CVE-2024-12912Arbitrary command executionRemote access via AiCloud7.2
CVE-2025-2492Unauthorized function executionImproper authentication control9.2

The following ASUS router models are known to be targeted in Operation WrtHug:

  • ASUS Wireless Router 4G-AC55U
  • ASUS Wireless Router 4G-AC860U
  • ASUS Wireless Router DSL-AC68U
  • ASUS Wireless Router GT-AC5300
  • ASUS Wireless Router GT-AX11000
  • ASUS Wireless Router RT-AC1200HP
  • ASUS Wireless Router RT-AC1300GPLUS
  • ASUS Wireless Router RT-AC1300UHP
  • Execute commands remotely without proper authentication
  • Abuses the proprietary AiCloud service to establish unauthorized high-privilege access using legitimate built-in features
  • Installs persistent SSH backdoors that survive reboots and firmware updates, ensuring long-term device control
  • Deploys a shared long-term TLS certificate to enable encrypted botnet communication and evade fingerprint-based detection
  • Converts compromised routers into encrypted relay nodes for proxying malicious traffic and expanding botnet infrastructure

Initial Access -> Exploitation of Outdated Firmware & N-day Vulnerabilities(CVE-2023-41345/46/47/48, CVE-2024-12912, CVE-2025-2492) -> Stealth Payload Delivery via AiCloud & Web Interface Abuse(SSH backdoor + certificate spoofing) -> Execution & Persistence (Root access, commands injected without UI change, SSH persistence, TLS certificate replacement valid for 100 years) -> Command & Control (Proxy routing via hijacked routers, shared 1894a6800dff523894eba7f31cea8d05d51032b4 TLS cert, dual-compromised IP overlap with AyySSHush) -> Impact (Espionage infrastructure building, covert C2 proxying, data exfiltration, targeted regional focus – Taiwan, SE Asia, U.S.)

  • 1894a6800dff523894eba7f31cea8d05d51032b4 (WrtHug TLS certificate thumbprint)
  • 46[.]132.187.85
  • 46[.]132.187.24
  • 221[.]43.126.86
  • 122[.]100.210.209
  • 59[.]26.66[.]44
  • 83[.]188.236[.]86
  • 195[.]234.71[.]218

The “Operation WrtHug” campaign demonstrates the following tactics and techniques:

  • TA0001 – Initial Access: The attackers exploit publicly known vulnerabilities in ASUS WRT routers to gain initial access.
  • T1190 – Exploit Public-Facing Application: The attackers target the ASUS AiCloud service to exploit known vulnerabilities in the routers.
  • TA0002 – Execution: The attackers use command injection and scripting interpreters to execute malicious commands on the compromised routers.
  • T1059 – Command and Scripting Interpreter: The attackers use command and scripting interpreters to execute malicious commands within the compromised routers.
  • TA0003 – Persistence: The attackers establish persistent backdoors via SSH, often abusing legitimate router features to ensure their presence survives reboots or firmware updates.
  • T1547 – Boot or Logon Autostart Execution: The attackers configure malicious scripts to execute automatically upon system startup, maintaining persistent access.
  • TA0004 – Privilege Escalation: The attackers exploit vulnerabilities to gain elevated privileges on the compromised routers.
  • T1068 – Exploitation for Privilege Escalation: The attackers exploit vulnerabilities to gain elevated privileges on the compromised routers.
  • Discontinue Use: Replace the affected routers with newer, supported models.
  • Disable Remote Access: If replacement is not immediately possible, disable remote access features like AiCloud to reduce the attack surface.
  • Monitor Network Traffic: Implement network monitoring solutions to detect unusual activity originating from these devices.

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.