CVE-2025-4753: Information Disclosure in D-Link DI-7003GV2
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4753 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability arises from improper handling or protection of the /login.data file, which contains sensitive information related to user authentication or session management. An attacker can remotely exploit this flaw without requiring any authentication or user interaction, leveraging network access to the device. The vulnerability is classified as problematic due to its potential to leak confidential information, which could include credentials or session tokens, thereby facilitating further attacks such as unauthorized access or network compromise. The CVSS 4.0 base score of 6.9 reflects a medium severity level, indicating a significant but not critical risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but does not affect integrity or availability. Although no public exploits are currently known to be in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation by malicious actors. No official patches or mitigations have been published at the time of this report, which increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for entities relying on the D-Link DI-7003GV2 router in their network infrastructure. Information disclosure can lead to leakage of sensitive credentials or session data, potentially enabling attackers to gain unauthorized access to internal networks or escalate privileges. This can compromise confidentiality of corporate data, disrupt business operations, and lead to regulatory non-compliance under GDPR if personal data is exposed. The remote exploitation capability without authentication makes it easier for attackers to target vulnerable devices across the internet or within corporate networks. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face increased risks of targeted attacks leveraging this vulnerability. Additionally, the lack of available patches means that affected organizations must rely on network-level defenses and monitoring to mitigate potential exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to reduce exposure. These include: 1) Restricting network access to the affected D-Link DI-7003GV2 devices by implementing strict firewall rules to limit inbound connections to trusted IP addresses only. 2) Segmenting the network to isolate vulnerable devices from critical assets and sensitive data repositories. 3) Monitoring network traffic for unusual access patterns or attempts to retrieve the /login.data file, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) solutions. 4) Changing default credentials and ensuring strong authentication mechanisms are in place to reduce the impact if information is leaked. 5) Engaging with D-Link support or vendor channels to obtain firmware updates or advisories as they become available. 6) Considering replacement of affected hardware if patching is not feasible within a reasonable timeframe. 7) Conducting regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-4753: Information Disclosure in D-Link DI-7003GV2
Description
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4753 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability arises from improper handling or protection of the /login.data file, which contains sensitive information related to user authentication or session management. An attacker can remotely exploit this flaw without requiring any authentication or user interaction, leveraging network access to the device. The vulnerability is classified as problematic due to its potential to leak confidential information, which could include credentials or session tokens, thereby facilitating further attacks such as unauthorized access or network compromise. The CVSS 4.0 base score of 6.9 reflects a medium severity level, indicating a significant but not critical risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but does not affect integrity or availability. Although no public exploits are currently known to be in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation by malicious actors. No official patches or mitigations have been published at the time of this report, which increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for entities relying on the D-Link DI-7003GV2 router in their network infrastructure. Information disclosure can lead to leakage of sensitive credentials or session data, potentially enabling attackers to gain unauthorized access to internal networks or escalate privileges. This can compromise confidentiality of corporate data, disrupt business operations, and lead to regulatory non-compliance under GDPR if personal data is exposed. The remote exploitation capability without authentication makes it easier for attackers to target vulnerable devices across the internet or within corporate networks. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face increased risks of targeted attacks leveraging this vulnerability. Additionally, the lack of available patches means that affected organizations must rely on network-level defenses and monitoring to mitigate potential exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to reduce exposure. These include: 1) Restricting network access to the affected D-Link DI-7003GV2 devices by implementing strict firewall rules to limit inbound connections to trusted IP addresses only. 2) Segmenting the network to isolate vulnerable devices from critical assets and sensitive data repositories. 3) Monitoring network traffic for unusual access patterns or attempts to retrieve the /login.data file, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) solutions. 4) Changing default credentials and ensuring strong authentication mechanisms are in place to reduce the impact if information is leaked. 5) Engaging with D-Link support or vendor channels to obtain firmware updates or advisories as they become available. 6) Considering replacement of affected hardware if patching is not feasible within a reasonable timeframe. 7) Conducting regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar weaknesses proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T09:03:09.303Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe01
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:34:07 PM
Last updated: 11/22/2025, 6:06:17 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.