Cyber Posture

CVE-2024-13062

HighRCE

Published: 02 January 2025

Published
02 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 43.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13062 is a high-severity Command Injection (CWE-77) vulnerability in Asus (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, ranked at the 43.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates command injection (CWE-77) in the AiCloud feature by enforcing validation of all user inputs to prevent arbitrary command execution.

prevent

Remediates the specific unintended entry point vulnerability through timely application of ASUS patches as outlined in the security advisory.

prevent

Reduces exposure to hidden functionality (CWE-912) by configuring the router to least functionality, such as disabling unnecessary AiCloud features.

NVD Description

An unintended entry point vulnerability has been identified in certain router models, which may allow for arbitrary command execution. Refer to the ' 01/02/2025 ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information.

Deeper analysisAI

CVE-2024-13062 is an unintended entry point vulnerability identified in certain ASUS router models, specifically impacting the AiCloud feature. This flaw may allow for arbitrary command execution and is linked to CWE-77 (Command Injection) and CWE-912 (Hidden Functionality). Published on January 2, 2025, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

The vulnerability can be exploited over the network by attackers with high privileges, such as authenticated administrative users, requiring low complexity and no user interaction. Successful exploitation enables arbitrary command execution on the router, resulting in high confidentiality, integrity, and availability impacts, potentially leading to full device compromise.

Mitigation details are outlined in the ASUS Product Security Advisory, particularly the "01/02/2025 ASUS Router AiCloud vulnerability" section, accessible at https://www.asus.com/content/asus-product-security-advisory/. Security practitioners should consult this advisory for affected models, patches, and recommended actions.

Details

CWE(s)

Affected Products

Asus
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-38835Shared CWE-77
CVE-2025-29228Shared CWE-77
CVE-2025-52690Shared CWE-77
CVE-2025-24285Shared CWE-77
CVE-2025-27423Shared CWE-77
CVE-2026-22864Shared CWE-77
CVE-2026-2333Shared CWE-77
CVE-2026-26795Shared CWE-77
CVE-2025-57199Shared CWE-77
CVE-2025-14756Shared CWE-77

References