Home / Technology / Asus Rushes to Patch Critical Security Flaws in Older DSL Routers
Asus Rushes to Patch Critical Security Flaws in Older DSL Routers
15 Nov
Summary
- Asus issued emergency firmware update for 3 older DSL modem-router models
- Routers affected are DSL-AC51, DSL-N16, and DSL-AC750 released in 2015-2017
- Vulnerable to authentication bypass flaw, users must update firmware immediately

On November 15, 2025, Asus issued an emergency firmware update for three older models of DSL modem-Wi-Fi router combos to address a critical security vulnerability. The affected devices are the DSL-AC51, DSL-N16, and DSL-AC750, which were released in 2015 and 2017.
These relatively basic DSL router models are susceptible to an authentication bypass flaw that has been documented in the Common Vulnerabilities and Exposures (CVE) database. Asus is urging owners of these older routers to update their firmware as soon as possible to close this security gap.
If users are unable to apply the patch, Asus recommends disabling advanced functions on the affected devices, including remote WAN access, port forwarding, DNS, VPN server, DMZ, port triggering, and FTP. However, the company has not specified which exact older, unsupported DSL routers this advice applies to beyond the three models mentioned.
The firmware updates can be downloaded and installed through the web-based interface of the affected routers. Asus has provided direct links to the support pages for the DSL-AC51, DSL-N16, and DSL-AC750 models to facilitate the update process for users.



