CVE-2025-4753: Information Disclosure in D-Link DI-7003GV2
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4753 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability arises from improper handling or protection of the /login.data file, which contains sensitive information related to user authentication or session management. An attacker can remotely exploit this flaw without requiring any authentication or user interaction, leveraging network access to the device. The vulnerability is classified as problematic due to its potential to leak confidential information, which could include credentials or session tokens, thereby facilitating further attacks such as unauthorized access or network compromise. The CVSS 4.0 base score of 6.9 reflects a medium severity level, indicating a significant but not critical risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but does not affect integrity or availability. Although no public exploits are currently known to be in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation by malicious actors. No official patches or mitigations have been published at the time of this report, which increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for entities relying on the D-Link DI-7003GV2 router in their network infrastructure. Information disclosure can lead to leakage of sensitive credentials or session data, potentially enabling attackers to gain unauthorized access to internal networks or escalate privileges. This can compromise confidentiality of corporate data, disrupt business operations, and lead to regulatory non-compliance under GDPR if personal data is exposed. The remote exploitation capability without authentication makes it easier for attackers to target vulnerable devices across the internet or within corporate networks. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face increased risks of targeted attacks leveraging this vulnerability. Additionally, the lack of available patches means that affected organizations must rely on network-level defenses and monitoring to mitigate potential exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to reduce exposure. These include: 1) Restricting network access to the affected D-Link DI-7003GV2 devices by implementing strict firewall rules to limit inbound connections to trusted IP addresses only. 2) Segmenting the network to isolate vulnerable devices from critical assets and sensitive data repositories. 3) Monitoring network traffic for unusual access patterns or attempts to retrieve the /login.data file, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) solutions. 4) Changing default credentials and ensuring strong authentication mechanisms are in place to reduce the impact if information is leaked. 5) Engaging with D-Link support or vendor channels to obtain firmware updates or advisories as they become available. 6) Considering replacement of affected hardware if patching is not feasible within a reasonable timeframe. 7) Conducting regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-4753: Information Disclosure in D-Link DI-7003GV2
Description
A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as problematic. Affected by this issue is some unknown functionality of the file /login.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4753 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically affecting firmware version 24.04.18D1 R(68125). The vulnerability arises from improper handling or protection of the /login.data file, which contains sensitive information related to user authentication or session management. An attacker can remotely exploit this flaw without requiring any authentication or user interaction, leveraging network access to the device. The vulnerability is classified as problematic due to its potential to leak confidential information, which could include credentials or session tokens, thereby facilitating further attacks such as unauthorized access or network compromise. The CVSS 4.0 base score of 6.9 reflects a medium severity level, indicating a significant but not critical risk. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but does not affect integrity or availability. Although no public exploits are currently known to be in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation by malicious actors. No official patches or mitigations have been published at the time of this report, which increases the urgency for affected organizations to implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for entities relying on the D-Link DI-7003GV2 router in their network infrastructure. Information disclosure can lead to leakage of sensitive credentials or session data, potentially enabling attackers to gain unauthorized access to internal networks or escalate privileges. This can compromise confidentiality of corporate data, disrupt business operations, and lead to regulatory non-compliance under GDPR if personal data is exposed. The remote exploitation capability without authentication makes it easier for attackers to target vulnerable devices across the internet or within corporate networks. Organizations in sectors with high security requirements, such as finance, healthcare, and critical infrastructure, could face increased risks of targeted attacks leveraging this vulnerability. Additionally, the lack of available patches means that affected organizations must rely on network-level defenses and monitoring to mitigate potential exploitation.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to reduce exposure. These include: 1) Restricting network access to the affected D-Link DI-7003GV2 devices by implementing strict firewall rules to limit inbound connections to trusted IP addresses only. 2) Segmenting the network to isolate vulnerable devices from critical assets and sensitive data repositories. 3) Monitoring network traffic for unusual access patterns or attempts to retrieve the /login.data file, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) solutions. 4) Changing default credentials and ensuring strong authentication mechanisms are in place to reduce the impact if information is leaked. 5) Engaging with D-Link support or vendor channels to obtain firmware updates or advisories as they become available. 6) Considering replacement of affected hardware if patching is not feasible within a reasonable timeframe. 7) Conducting regular vulnerability assessments and penetration testing focused on network devices to identify and remediate similar weaknesses proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T09:03:09.303Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe01
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:34:07 PM
Last updated: 1/7/2026, 4:52:29 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.