CVE-2025-4749: Denial of Service in D-Link DI-7003GV2
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4749 is a critical vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability resides in the Factory Reset Handler component, within the function sub_4983B0 of the /H5/backup.asp?opt=reset endpoint. An attacker can remotely exploit this flaw without any authentication or user interaction, by sending crafted requests to this endpoint. Successful exploitation leads to a denial of service (DoS) condition, effectively disrupting the normal operation of the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability beyond the denial of service (VA:H). The scope is unchanged, and no known exploits are currently observed in the wild, although the exploit details have been publicly disclosed. This vulnerability could be leveraged by attackers to disrupt network connectivity or availability of services relying on the affected router, potentially impacting business continuity and network reliability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, especially for those relying on the D-Link DI-7003GV2 router model. A successful DoS attack could interrupt internet access, intranet communications, or critical services dependent on this device, leading to operational downtime and potential financial losses. Sectors such as telecommunications, small and medium enterprises, and critical infrastructure operators using this router could face service degradation or outages. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Given the public disclosure of the exploit, threat actors may develop automated attack tools targeting vulnerable devices, amplifying the risk. The impact extends beyond immediate service disruption, as repeated or prolonged outages could affect customer trust, regulatory compliance, and incident response resources.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DI-7003GV2 router with the affected firmware version 24.04.18D1 R(68125). In the absence of an official patch (none currently linked), the following specific mitigations are recommended: 1) Restrict access to the router’s management interface and the /H5/backup.asp endpoint by implementing network segmentation and firewall rules to block unauthorized external traffic. 2) Disable remote management features if not required, or limit them to trusted IP addresses only. 3) Monitor network traffic for unusual requests targeting the /H5/backup.asp?opt=reset endpoint and set up alerts for potential exploitation attempts. 4) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation patterns related to this vulnerability. 5) Engage with D-Link support for firmware updates or patches and plan for timely firmware upgrades once available. 6) As a temporary measure, consider replacing vulnerable devices with alternative hardware if critical services depend on uninterrupted availability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4749: Denial of Service in D-Link DI-7003GV2
Description
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4749 is a critical vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability resides in the Factory Reset Handler component, within the function sub_4983B0 of the /H5/backup.asp?opt=reset endpoint. An attacker can remotely exploit this flaw without any authentication or user interaction, by sending crafted requests to this endpoint. Successful exploitation leads to a denial of service (DoS) condition, effectively disrupting the normal operation of the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability beyond the denial of service (VA:H). The scope is unchanged, and no known exploits are currently observed in the wild, although the exploit details have been publicly disclosed. This vulnerability could be leveraged by attackers to disrupt network connectivity or availability of services relying on the affected router, potentially impacting business continuity and network reliability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, especially for those relying on the D-Link DI-7003GV2 router model. A successful DoS attack could interrupt internet access, intranet communications, or critical services dependent on this device, leading to operational downtime and potential financial losses. Sectors such as telecommunications, small and medium enterprises, and critical infrastructure operators using this router could face service degradation or outages. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Given the public disclosure of the exploit, threat actors may develop automated attack tools targeting vulnerable devices, amplifying the risk. The impact extends beyond immediate service disruption, as repeated or prolonged outages could affect customer trust, regulatory compliance, and incident response resources.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DI-7003GV2 router with the affected firmware version 24.04.18D1 R(68125). In the absence of an official patch (none currently linked), the following specific mitigations are recommended: 1) Restrict access to the router’s management interface and the /H5/backup.asp endpoint by implementing network segmentation and firewall rules to block unauthorized external traffic. 2) Disable remote management features if not required, or limit them to trusted IP addresses only. 3) Monitor network traffic for unusual requests targeting the /H5/backup.asp?opt=reset endpoint and set up alerts for potential exploitation attempts. 4) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation patterns related to this vulnerability. 5) Engage with D-Link support for firmware updates or patches and plan for timely firmware upgrades once available. 6) As a temporary measure, consider replacing vulnerable devices with alternative hardware if critical services depend on uninterrupted availability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T09:02:59.051Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdb9
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:18:23 PM
Last updated: 11/21/2025, 3:50:32 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64310: Improper restriction of excessive authentication attempts in SEIKO EPSON CORPORATION EPSON WebConfig for SEIKO EPSON Projector Products
CriticalCVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
HighCVE-2025-64755: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-62426: CWE-770: Allocation of Resources Without Limits or Throttling in vllm-project vllm
MediumCVE-2025-62372: CWE-129: Improper Validation of Array Index in vllm-project vllm
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.