The network equipment that connects to your computer is essentially composed of computers themselves, and they are often more intricate than one might expect. These devices are sophisticated enough to run customized software, which leaves them vulnerable to hacking and potential misuse.
A recent report highlights that around 9,000 Asus-branded network routers have been hijacked and turned into a botnet. This infection occurs via a command injection flaw, allowing hackers to gain SSH access through a custom port for remote control.
Once compromised, these routers remain infected even after rebooting or updating their firmware. This persistence is due to configurations that are stored in non-volatile memory.
As a result, if your router is infected, a complete factory reset and manual reconfiguration are necessary to eradicate the intrusion. Users can recognize a compromise by observing unusual activity stemming from specific IP addresses and access through the TCP/53282 port.
However, given that these indicators are now public knowledge, hackers may alter their methods to evade detection. Fortunately, there are measures you can take if you own a vulnerable router that has not yet been attacked.
Updating your Asus router to the latest firmware—available from or after May 27, 2025—can help safeguard your device. However, it’s crucial to note that if your router has already been compromised, simply updating the firmware will not suffice.
A complete factory reset is essential to fully eliminate the hackers’ presence and to secure the device effectively.