Skip to main content

CVE-2025-4753: Information Disclosure in D-Link DI-7003GV2

Medium
VulnerabilityCVE-2025-4753cvecve-2025-4753
Published: Fri May 16 2025 (05/16/2025, 06:31:05 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DI-7003GV2

Description

A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:34:07 UTC

Technical Analysis

CVE-2025-4753 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability arises from improper handling or protection of the /login.data file, which contains sensitive information related to user authentication or session management. An attacker can remotely exploit this flaw without requiring any authentication or user interaction, leveraging network access to the device. The vulnerability is classified as problematic due to its potential to leak confidential information, which could include credentials or session tokens, thereby facilitating further attacks such as unauthorized access or network compromise. The CVSS 4.0 base score of 6.9 reflects a medium severity level, indicating a significant but not critical risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but does not affect integrity or availability. Although no public exploits are currently known to be in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation by malicious actors. No official patches or mitigations have been published at the time of this report, which increases the urgency for affected organizations to implement compensating controls.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, particularly for entities relying on the D-Link DI-7003GV2 router in their network infrastructure. Information disclosure can lead to leakage of sensitive credentials or session data, potentially enabling attackers to gain unauthorized access to internal networks or escalate privileges. This can compromise confidentiality of corporate data, disrupt business operations, and lead to regulatory non-compliance under GDPR if personal data is exposed. The remote exploitation capability without authentication makes it easier for attackers to target vulnerable devices across the internet or within corporate networks. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face increased risks of targeted attacks leveraging this vulnerability. Additionally, the lack of available patches means that affected organizations must rely on network-level defenses and monitoring to mitigate potential exploitation.

Mitigation Recommendations

Given the absence of official patches, European organizations should take immediate steps to reduce exposure. These include: 1) Restricting network access to the affected D-Link DI-7003GV2 devices by implementing strict firewall rules to limit inbound connections to trusted IP addresses only. 2) Segmenting the network to isolate vulnerable devices from critical assets and sensitive data repositories. 3) Monitoring network traffic for unusual access patterns or attempts to retrieve the /login.data file, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) solutions. 4) Changing default credentials and ensuring strong authentication mechanisms are in place to reduce the impact if information is leaked. 5) Engaging with D-Link support or vendor channels to obtain firmware updates or advisories as they become available. 6) Considering replacement of affected hardware if patching is not feasible within a reasonable timeframe. 7) Conducting regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-15T09:03:09.303Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe01

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 11:34:07 PM

Last updated: 8/11/2025, 10:10:47 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats