Security researchers have identified an extensive covert campaign known as Operation WrtHug, which has compromised over 50000 Asus routers worldwide. Operation WrtHug targeting outdated Asus routers has been carried out by state-affiliated China-based threat actors. The campaign is targeting outdated Asus devices to establish a stealthy espionage network using compromised routers worldwide.[1][2][3]
This campaign represents a sharp escalation in router-targeted cyberattacks, leveraging sophisticated multi-vulnerability exploits while maintaining operational stealth.
Specific Asus Router Models Targeted and Geographic Concentration
The routers affected by Operation WrtHug hits all belong to a set of end-of-life (EoL) Asus models, which no longer receive firmware updates from the manufacturer, making them highly vulnerable:
- Asus Wireless Router RT-AC1300GPLUS
- Asus Wireless Router RT-AC1300UHP
- Asus Wireless Router GT-AX11000
- Asus Wireless Router RT-AC1200HP
- Asus Wireless Router GT-AC5300
- Asus Wireless Router DSL-AC68U
- Asus Wireless Router 4G-AC55U
- Asus Wireless Router 4G-AC860U
Geographically, the majority of infections are detected in Taiwan and Southeast Asia with smaller clusters in the United States, Russia, Central Europe, South Korea, Japan, and Hong Kong.[4][5]
How Attackers Exploit Vulnerabilities to Compromise Routers
Attackers exploit six publicly disclosed vulnerabilities, primarily related to command injection and authentication bypass flaws affecting the Asus AiCloud service, which is designed to provide remote file access. The exploited vulnerabilities include:
- CVE-2023-41345
- CVE-2023-41346
- CVE-2023-41347
- CVE-2023-41348
- CVE-2024-12912
- CVE-2025-2492
By chaining these vulnerabilities, attackers achieve persistent administrator-level access on routers, often surviving reboots and circumventing firmware updates.[7][6]
Distinctive Indicator of Compromise
One hallmark of these compromised routers is the installation of a self-signed Transport Layer Security (TLS) certificate with suspicious attributes:
- Certificate expiration set roughly 100 years after April 2022 (around year 2122).
- Issuer and subject attributes set generically to “CN=a,OU=a,O=a,L=a,ST=a,C=aa”.
This certificate enables attackers to intercept and manipulate encrypted router management communications stealthily, bypassing typical security warnings.[8][9]
Espionage-Focused Stealth Operation
Unlike more visible attacks like DDoS, Operation WrtHug is believed to support spy network infrastructure operations consistent with operational relay box (ORB) tactics. Compromised routers act as proxies to mask attacker origins and conduct covert reconnaissance globally. This aligns closely with known campaigns by Chinese advanced persistent threat (APT) groups such as APT31.[10]
How to Verify If Your Router Is Compromised
To check if your Asus router is affected, follow these steps:
- Log into your router’s administrative web interface (commonly at 192.168.1.1).
- Locate the security or certificate management settings section.
- Inspect installed TLS certificates for expiration dates set in the year 2122 and issuer/subject fields marked as CN=a,OU=a,O=a,L=a,ST=a,C=aa.
- Follow Asus’s official instructions to export or view the TLS certificate details for confirmation.[11][3]
Recommended Actions to Protect Your Network
If you own a vulnerable Asus router or suspect compromise, security experts advise:
- Immediately replace affected end-of-life devices with current models receiving firmware patches.
- Disable unnecessary remote access features such as AiCloud, SSH, UPnP, and port forwarding.
- Change default and weak passwords to strong, unique credentials.
- Regularly check for and install Asus official firmware updates.
- Monitor your network for unusual traffic or unknown device connections.
Operation WrtHug serves as a critical reminder that obsolete network hardware poses serious security risks. Maintaining up-to-date hardware, following best security practices, and monitoring device integrity is essential to guard personal and organizational networks.