CVE-2025-4902: Information Disclosure in D-Link DI-7003GV2
A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this issue is the function sub_48F4F0 of the file /H5/versionupdate.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4902 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically in firmware version 24.04.18D1 R(68125). The vulnerability resides in the function sub_48F4F0 within the /H5/versionupdate.data file. An attacker can remotely exploit this flaw without requiring authentication or user interaction, leveraging network access to the device. The vulnerability allows unauthorized disclosure of potentially sensitive information stored or processed by the device. Although the exact nature of the leaked information is not detailed, information disclosure vulnerabilities typically expose configuration details, firmware versions, or other data that could facilitate further attacks. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but not integrity or availability. There is no indication that the vulnerability has been exploited in the wild yet, but a public exploit is available, increasing the risk of exploitation. No official patches or mitigation links have been provided at this time, which suggests that affected organizations need to implement compensating controls until a vendor fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the deployment scale of the D-Link DI-7003GV2 routers. Information disclosure can lead to exposure of sensitive network configuration, firmware details, or other internal data that attackers can use to plan more sophisticated attacks such as targeted intrusions, lateral movement, or exploitation of other vulnerabilities. This risk is particularly relevant for enterprises, ISPs, and critical infrastructure operators using this model. The remote, unauthenticated nature of the exploit means attackers can attempt to compromise devices from anywhere, increasing the attack surface. While the vulnerability does not directly affect system integrity or availability, the leaked information could facilitate subsequent attacks that do. Given the lack of patches, organizations face a window of exposure that could be exploited by threat actors, including cybercriminals or state-sponsored groups targeting European networks. The medium severity rating suggests a moderate but non-trivial risk, warranting prompt attention to reduce potential exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate D-Link DI-7003GV2 devices from public-facing networks and restrict access to trusted management networks only. 2. Access Control: Implement strict firewall rules to limit inbound traffic to the device’s management interfaces, allowing only authorized IP addresses. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual traffic patterns or attempts to access the vulnerable function. 4. Firmware Updates: Regularly check D-Link’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches immediately upon release. 5. Device Replacement: For critical environments, consider replacing affected devices with models that have no known vulnerabilities or have received security updates. 6. Incident Response Preparation: Prepare to respond to potential exploitation attempts by having logs and forensic capabilities in place to investigate suspicious activity. 7. Vendor Engagement: Contact D-Link support to inquire about timelines for patches or recommended mitigations specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4902: Information Disclosure in D-Link DI-7003GV2
Description
A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this issue is the function sub_48F4F0 of the file /H5/versionupdate.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4902 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically in firmware version 24.04.18D1 R(68125). The vulnerability resides in the function sub_48F4F0 within the /H5/versionupdate.data file. An attacker can remotely exploit this flaw without requiring authentication or user interaction, leveraging network access to the device. The vulnerability allows unauthorized disclosure of potentially sensitive information stored or processed by the device. Although the exact nature of the leaked information is not detailed, information disclosure vulnerabilities typically expose configuration details, firmware versions, or other data that could facilitate further attacks. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but not integrity or availability. There is no indication that the vulnerability has been exploited in the wild yet, but a public exploit is available, increasing the risk of exploitation. No official patches or mitigation links have been provided at this time, which suggests that affected organizations need to implement compensating controls until a vendor fix is released.
Potential Impact
For European organizations, the impact of this vulnerability can be significant depending on the deployment scale of the D-Link DI-7003GV2 routers. Information disclosure can lead to exposure of sensitive network configuration, firmware details, or other internal data that attackers can use to plan more sophisticated attacks such as targeted intrusions, lateral movement, or exploitation of other vulnerabilities. This risk is particularly relevant for enterprises, ISPs, and critical infrastructure operators using this model. The remote, unauthenticated nature of the exploit means attackers can attempt to compromise devices from anywhere, increasing the attack surface. While the vulnerability does not directly affect system integrity or availability, the leaked information could facilitate subsequent attacks that do. Given the lack of patches, organizations face a window of exposure that could be exploited by threat actors, including cybercriminals or state-sponsored groups targeting European networks. The medium severity rating suggests a moderate but non-trivial risk, warranting prompt attention to reduce potential exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate D-Link DI-7003GV2 devices from public-facing networks and restrict access to trusted management networks only. 2. Access Control: Implement strict firewall rules to limit inbound traffic to the device’s management interfaces, allowing only authorized IP addresses. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual traffic patterns or attempts to access the vulnerable function. 4. Firmware Updates: Regularly check D-Link’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches immediately upon release. 5. Device Replacement: For critical environments, consider replacing affected devices with models that have no known vulnerabilities or have received security updates. 6. Incident Response Preparation: Prepare to respond to potential exploitation attempts by having logs and forensic capabilities in place to investigate suspicious activity. 7. Vendor Engagement: Contact D-Link support to inquire about timelines for patches or recommended mitigations specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-17T13:06:13.410Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb810
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:34:33 PM
Last updated: 7/31/2025, 5:28:52 PM
Views: 9
Related Threats
CVE-2025-55149: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ulab-uiuc tiny-scientist
MediumCVE-2025-55013: CWE-23: Relative Path Traversal in CybercentreCanada assemblyline
CriticalCVE-2025-55009: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in workos authkit-remix
HighCVE-2025-55008: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in workos authkit-react-router
HighCVE-2025-55006: CWE-20: Improper Input Validation in frappe lms
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.