Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14693: Symlink Following in Ugreen DH2100+

0
High
VulnerabilityCVE-2025-14693cvecve-2025-14693
Published: Mon Dec 15 2025 (12/15/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Ugreen
Product: DH2100+

Description

A vulnerability has been found in Ugreen DH2100+ up to 5.3.0. This affects an unknown function of the component USB Handler. Such manipulation leads to symlink following. The attack can be executed directly on the physical device. The exploit has been disclosed to the public and may be used. It is suggested to upgrade the affected component.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:19:20 UTC

Technical Analysis

CVE-2025-14693 is a vulnerability identified in the Ugreen DH2100+ device, specifically impacting the USB Handler component in firmware versions up to 5.3.0. The root cause is improper handling of symbolic links (symlink following), which allows an attacker with physical access to the device to manipulate the USB Handler's behavior. This can lead to unauthorized access or modification of files or system components that the USB Handler interacts with, potentially compromising confidentiality, integrity, and availability of the device's data or functionality. The attack vector requires physical access (AV:P), but the vulnerability has low attack complexity (AC:L), does not require user interaction (UI:N), and requires high privileges (PR:H) on the device. The vulnerability impacts confidentiality, integrity, and availability to a high degree (VC:H, VI:H, VA:H). No network or software-based remote exploitation is indicated, limiting the scope to scenarios where an attacker can physically interact with the device. The vulnerability was publicly disclosed on December 15, 2025, with no known exploits in the wild at the time of publication. The lack of patch links suggests that users should monitor vendor communications for updates or firmware upgrades. The vulnerability's presence in a USB Handler component indicates potential risks in environments where these devices are used for data transfer or peripheral connectivity, especially in sensitive or critical infrastructure contexts.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where Ugreen DH2100+ devices are deployed and physical access controls may be insufficient. Potential impacts include unauthorized data access or manipulation, disruption of device functionality, and possible compromise of connected systems if the USB Handler is used in critical workflows. Industries such as manufacturing, healthcare, finance, and government agencies that rely on secure USB devices for data transfer or peripheral management could face operational disruptions or data breaches. The requirement for physical access limits remote exploitation but increases the importance of physical security measures. Additionally, the high privileges needed to exploit the vulnerability suggest insider threats or attackers with elevated access could leverage this flaw to escalate attacks. The public disclosure of the exploit details increases the risk of targeted attacks if patches are not applied promptly. Failure to mitigate this vulnerability could lead to regulatory compliance issues under GDPR and other European data protection laws if sensitive data is compromised.

Mitigation Recommendations

1. Immediately monitor Ugreen communications for firmware updates or patches addressing CVE-2025-14693 and apply them as soon as they become available. 2. Implement strict physical security controls to prevent unauthorized access to devices, including secure storage and restricted access areas. 3. Conduct an inventory of all Ugreen DH2100+ devices in use and assess their firmware versions to identify vulnerable units. 4. Where possible, replace or isolate vulnerable devices in critical environments until patched. 5. Employ endpoint security solutions that can detect anomalous USB device behavior or unauthorized device usage. 6. Train staff on the risks associated with physical device access and enforce policies limiting device handling to authorized personnel only. 7. Use device control software to restrict USB device usage and monitor for suspicious activities. 8. Regularly audit and review access logs and device usage to detect potential exploitation attempts. 9. Consider network segmentation to limit the impact of compromised devices on broader systems. 10. Engage with Ugreen support channels for guidance and to confirm patch availability and deployment procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-14T10:48:51.666Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693f5b33b0f1e1d53033ca1b

Added to database: 12/15/2025, 12:49:55 AM

Last enriched: 1/28/2026, 7:19:20 PM

Last updated: 2/5/2026, 4:15:58 AM

Views: 136

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats