A newly identified botnet called KadNap has compromised thousands of Asus routers worldwide by exploiting weaknesses in the devices’ remote-access features, turning ordinary home networking equipment into weapons for coordinated cyberattacks. The campaign targets Asus’s AiCloud functionality, a cloud-based service that lets users access files stored on USB drives connected to their routers from anywhere on the internet. That convenience, left unpatched and exposed, has given attackers a direct path into home and small-business networks at scale.
How AiCloud Became an Open Door
The core vulnerability enabling KadNap’s spread is tracked as CVE-2025-59368, a flaw tied to Asus’s AiCloud feature. The National Vulnerability Database entry for this specific CVE provides standardized metadata and links back to Asus advisories detailing affected firmware versions and available patches. AiCloud works by exposing a management interface to the public internet so users can reach their router remotely. That same exposure, when paired with an authentication or input-validation flaw, hands attackers the ability to execute commands on the device without the owner’s knowledge.
What makes this particular vulnerability attractive to botnet operators is the sheer number of Asus routers deployed in homes and small offices around the world. Many of these devices ship with AiCloud enabled or easily toggled on, and firmware updates often go unapplied for months or years. The result is a large population of internet-facing devices running outdated software, each one a potential recruit for KadNap’s network.
Attackers scan the global internet for routers that respond on the ports associated with AiCloud and then probe them for the CVE-2025-59368 weakness. Once they confirm that a device is running a vulnerable firmware version, they can send crafted requests that bypass normal authentication and inject commands. Because the exploit chain targets the router’s own management logic, it does not depend on tricking the end user into clicking a link or installing malicious software. The attack surface lives entirely on the router itself.
From Home Router to Attack Platform
Once KadNap gains a foothold on a vulnerable router, it enrolls the device into a distributed command-and-control network. Compromised routers can then be directed to launch distributed denial-of-service attacks, relay malicious traffic to obscure its origin, or serve as proxy nodes for data exfiltration. Because the infected device is a legitimate consumer router sitting on a residential IP address, traffic originating from it is less likely to trigger corporate or government intrusion-detection systems.
This dynamic creates a problem that extends well beyond the router owner. A single hijacked Asus router might contribute only a small slice of bandwidth to a DDoS flood, but thousands of them acting in concert can overwhelm targets ranging from e-commerce platforms to critical infrastructure providers. The owner of the router, meanwhile, may notice nothing more than slightly degraded Wi-Fi performance, if that. The asymmetry between the minimal impact on the device owner and the outsized harm to downstream targets is what makes consumer-router botnets so persistent and difficult to dismantle.
Once installed, KadNap’s malware typically attempts to entrench itself by modifying startup scripts and blocking competing malware from taking over the same device. It may also periodically reach out to its controllers to download updated attack modules, allowing the botnet to evolve without further interaction from the router’s owner. From the outside, the only clues might be unusual spikes in outbound traffic, throttled streaming quality, or complaints from an internet service provider about abusive activity.
A Policy Gap the Government Already Flagged
The federal government has been warning about exactly this class of risk for years. The U.S. Cybersecurity and Infrastructure Security Agency issued Binding Operational Directive 23-02, which focuses on mitigating risk from internet-exposed management interfaces. The directive establishes that public-facing administrative panels on network devices are a major security liability and prescribes two basic mitigation actions: remove them from the open internet or protect them with strong access controls such as VPNs and limited IP allowlists.
BOD 23-02 applies directly to federal civilian agencies, not to private consumers or hardware vendors. But its logic is universal. Any device whose administrative panel is reachable from the open internet without adequate authentication is an invitation for exploitation. The directive’s existence signals that U.S. cybersecurity authorities recognized the systemic danger of exposed management interfaces well before KadNap began spreading. The gap is that consumer routers sit outside the directive’s enforcement scope, leaving millions of devices governed only by their owners’ awareness and willingness to patch.
That policy divide creates a two-tiered security environment. Government systems are compelled to lock down remote management, while home and small-business networks remain largely unmanaged and exposed. Botnet operators exploit this imbalance, harvesting vulnerable routers from the consumer side to mount attacks that may ultimately threaten the very critical infrastructure the directive is meant to protect.
Why Conventional Coverage Misses the Real Risk
Most early reporting on KadNap has focused on the scale of infections and the identity of affected hardware. That framing, while accurate, misses a deeper concern. The botnet’s success is not simply a story about one bad vulnerability in one product line. It reflects a structural failure in how consumer networking equipment gets maintained after sale.
Asus, like most router manufacturers, publishes firmware updates when vulnerabilities surface. The CVE-2025-59368 record in the National Vulnerability Database includes references to Asus advisories that provide patching guidance. But the update pipeline for consumer routers is fundamentally broken. Unlike smartphones, which push updates automatically and persistently nag users to install them, most routers require the owner to log into a web interface, check for new firmware, and manually apply it. Many owners never do. Some do not even know the option exists.
This creates a predictable cycle. A vulnerability is discovered, a patch is released, and adoption trickles in slowly while attackers race to exploit the window. KadNap appears to be capitalizing on exactly that lag. The botnet’s operators do not need a zero-day exploit or sophisticated social engineering. They need only scan the internet for Asus routers still running vulnerable AiCloud firmware and then deploy their payload. The technical barrier is low; the primary enabler is neglect.
Compounding the problem, router lifespans often exceed the period during which vendors provide security updates. Devices can remain in service for a decade or more, long after official support has ended. When those aging routers expose management features like AiCloud to the internet, they become permanent footholds for botnets, with no realistic prospect of ever being patched.
What Router Owners Can Do Right Now
The most effective immediate step for Asus router owners is to check whether AiCloud is enabled and, if it is not actively needed, disable it. Turning off the feature removes the exposed management interface entirely, eliminating the attack surface KadNap relies on. For users who depend on AiCloud for remote file access, updating to the latest firmware version is essential. Asus’s own advisories, referenced in the CVE-2025-59368 record, identify which firmware releases address the flaw.
Beyond patching, owners should verify that their router’s administrative interface is not accessible from the public internet. This means disabling remote management unless it is strictly necessary and, where remote access is required, restricting it to specific IP addresses or placing it behind a VPN. These steps mirror the mitigation framework in CISA’s directive, which calls for either removing management interfaces from the internet or mediating access through strong controls.
- Log into your Asus router’s admin panel and check AiCloud status under the cloud services or similar menu.
- If AiCloud is not in active use, disable it to close the exposed interface entirely.
- Navigate to the remote management settings and ensure that administration from the internet is turned off by default.
- If remote administration is required, restrict access to known IP addresses and enable the strongest available authentication options.
- Manually check for firmware updates and apply the latest version referenced in Asus’s security advisories tied to CVE-2025-59368.
- Consider replacing older routers that no longer receive security updates, especially if they host any cloud or remote-access features.
None of these steps require deep technical expertise, but they do require awareness and a few minutes of attention, two ingredients often missing in the rush to get a new router online. KadNap thrives in that gap between capability and configuration. Until consumer networking gear is designed and sold with secure defaults, automatic updates, and clearer warnings about exposed interfaces, botnets built on home routers will remain an enduring feature of the internet’s threat landscape.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.