CVE-2025-4749: Denial of Service in D-Link DI-7003GV2
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4749 is a critical vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability resides in the Factory Reset Handler component, within the function sub_4983B0 of the /H5/backup.asp?opt=reset endpoint. An attacker can remotely exploit this flaw without any authentication or user interaction, by sending crafted requests to this endpoint. Successful exploitation leads to a denial of service (DoS) condition, effectively disrupting the normal operation of the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability beyond the denial of service (VA:H). The scope is unchanged, and no known exploits are currently observed in the wild, although the exploit details have been publicly disclosed. This vulnerability could be leveraged by attackers to disrupt network connectivity or availability of services relying on the affected router, potentially impacting business continuity and network reliability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, especially for those relying on the D-Link DI-7003GV2 router model. A successful DoS attack could interrupt internet access, intranet communications, or critical services dependent on this device, leading to operational downtime and potential financial losses. Sectors such as telecommunications, small and medium enterprises, and critical infrastructure operators using this router could face service degradation or outages. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Given the public disclosure of the exploit, threat actors may develop automated attack tools targeting vulnerable devices, amplifying the risk. The impact extends beyond immediate service disruption, as repeated or prolonged outages could affect customer trust, regulatory compliance, and incident response resources.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DI-7003GV2 router with the affected firmware version 24.04.18D1 R(68125). In the absence of an official patch (none currently linked), the following specific mitigations are recommended: 1) Restrict access to the router’s management interface and the /H5/backup.asp endpoint by implementing network segmentation and firewall rules to block unauthorized external traffic. 2) Disable remote management features if not required, or limit them to trusted IP addresses only. 3) Monitor network traffic for unusual requests targeting the /H5/backup.asp?opt=reset endpoint and set up alerts for potential exploitation attempts. 4) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation patterns related to this vulnerability. 5) Engage with D-Link support for firmware updates or patches and plan for timely firmware upgrades once available. 6) As a temporary measure, consider replacing vulnerable devices with alternative hardware if critical services depend on uninterrupted availability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4749: Denial of Service in D-Link DI-7003GV2
Description
A vulnerability classified as critical was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This vulnerability affects the function sub_4983B0 of the file /H5/backup.asp?opt=reset of the component Factory Reset Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4749 is a critical vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability resides in the Factory Reset Handler component, within the function sub_4983B0 of the /H5/backup.asp?opt=reset endpoint. An attacker can remotely exploit this flaw without any authentication or user interaction, by sending crafted requests to this endpoint. Successful exploitation leads to a denial of service (DoS) condition, effectively disrupting the normal operation of the device. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector classified as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability beyond the denial of service (VA:H). The scope is unchanged, and no known exploits are currently observed in the wild, although the exploit details have been publicly disclosed. This vulnerability could be leveraged by attackers to disrupt network connectivity or availability of services relying on the affected router, potentially impacting business continuity and network reliability.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network infrastructure stability, especially for those relying on the D-Link DI-7003GV2 router model. A successful DoS attack could interrupt internet access, intranet communications, or critical services dependent on this device, leading to operational downtime and potential financial losses. Sectors such as telecommunications, small and medium enterprises, and critical infrastructure operators using this router could face service degradation or outages. Additionally, the lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Given the public disclosure of the exploit, threat actors may develop automated attack tools targeting vulnerable devices, amplifying the risk. The impact extends beyond immediate service disruption, as repeated or prolonged outages could affect customer trust, regulatory compliance, and incident response resources.
Mitigation Recommendations
Organizations should immediately verify if they are using the D-Link DI-7003GV2 router with the affected firmware version 24.04.18D1 R(68125). In the absence of an official patch (none currently linked), the following specific mitigations are recommended: 1) Restrict access to the router’s management interface and the /H5/backup.asp endpoint by implementing network segmentation and firewall rules to block unauthorized external traffic. 2) Disable remote management features if not required, or limit them to trusted IP addresses only. 3) Monitor network traffic for unusual requests targeting the /H5/backup.asp?opt=reset endpoint and set up alerts for potential exploitation attempts. 4) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation patterns related to this vulnerability. 5) Engage with D-Link support for firmware updates or patches and plan for timely firmware upgrades once available. 6) As a temporary measure, consider replacing vulnerable devices with alternative hardware if critical services depend on uninterrupted availability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T09:02:59.051Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdb9
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:18:23 PM
Last updated: 8/16/2025, 9:55:30 AM
Views: 12
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.