Skip to main content

CVE-2025-10880: CWE-522 Insufficiently Protected Credentials in Dingtian DT-R002

High
VulnerabilityCVE-2025-10880cvecve-2025-10880cwe-522
Published: Thu Sep 25 2025 (09/25/2025, 16:32:17 UTC)
Source: CVE Database V5
Vendor/Project: Dingtian
Product: DT-R002

Description

All versions of Dingtian DT-R002 are vulnerable to an Insufficiently Protected Credentials vulnerability that could allow an attacker to extract the proprietary "Dingtian Binary" protocol password by sending an unauthenticated GET request.

AI-Powered Analysis

AILast updated: 09/25/2025, 16:42:26 UTC

Technical Analysis

CVE-2025-10880 is a high-severity vulnerability affecting all versions of the Dingtian DT-R002 device. The vulnerability is classified under CWE-522, which refers to Insufficiently Protected Credentials. Specifically, this flaw allows an unauthenticated attacker to extract the proprietary "Dingtian Binary" protocol password by sending a simple unauthenticated GET request to the device. This means that no prior authentication or user interaction is required to exploit the vulnerability, and the attack can be performed remotely over the network. The exposed password could enable attackers to gain unauthorized access to the device's proprietary protocol communications, potentially allowing them to manipulate device functions, intercept sensitive data, or pivot within the network. The CVSS 4.0 base score is 8.7, indicating a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and a high impact on confidentiality (VC:H) with no impact on integrity or availability. The vulnerability is currently published and has no known exploits in the wild, and no patches have been released yet. The device in question, Dingtian DT-R002, is likely used in industrial or specialized network environments given the proprietary protocol context, which raises concerns about the security of operational technology (OT) or critical infrastructure systems that rely on it.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those operating in sectors that utilize Dingtian DT-R002 devices, such as industrial control systems, manufacturing, or critical infrastructure. The ability to extract protocol passwords without authentication could lead to unauthorized access to sensitive operational data and control commands, potentially resulting in espionage, sabotage, or disruption of services. Confidentiality breaches could expose proprietary or sensitive operational information. Although the vulnerability does not directly impact integrity or availability, the compromised credentials could be leveraged to perform further attacks that might affect these aspects. The lack of authentication and user interaction requirements means that attackers can exploit this vulnerability remotely and stealthily, increasing the risk of widespread compromise. European organizations with interconnected OT and IT networks could face lateral movement risks, making containment and remediation more complex. Additionally, regulatory frameworks such as NIS2 and GDPR emphasize the protection of critical infrastructure and personal data, so exploitation could lead to compliance violations and reputational damage.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, network segmentation should be enforced to isolate Dingtian DT-R002 devices from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules to block unauthorized inbound traffic, especially unauthenticated GET requests targeting the device. Continuous network monitoring and anomaly detection should be enhanced to identify unusual access patterns or attempts to retrieve credentials. If possible, disable or restrict the proprietary protocol or the vulnerable interface until a patch is available. Organizations should engage with the vendor to obtain timelines for patches or firmware updates and participate in coordinated vulnerability disclosure programs. Additionally, implementing multi-factor authentication and strong access controls on management interfaces can reduce risk. Regularly auditing device configurations and credentials, and maintaining an inventory of affected devices, will aid in rapid response. Finally, incident response plans should be updated to address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-09-23T15:29:33.138Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d57020e272fbc5dc2d800f

Added to database: 9/25/2025, 4:38:56 PM

Last enriched: 9/25/2025, 4:42:26 PM

Last updated: 9/25/2025, 6:40:59 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats