Skip to main content

CVE-2025-4902: Information Disclosure in D-Link DI-7003GV2

Medium
VulnerabilityCVE-2025-4902cvecve-2025-4902
Published: Mon May 19 2025 (05/19/2025, 00:00:08 UTC)
Source: CVE
Vendor/Project: D-Link
Product: DI-7003GV2

Description

A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2 24.04.18D1 R(68125). Affected by this issue is the function sub_48F4F0 of the file /H5/versionupdate.data. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:34:33 UTC

Technical Analysis

CVE-2025-4902 is an information disclosure vulnerability identified in the D-Link DI-7003GV2 router, specifically in firmware version 24.04.18D1 R(68125). The vulnerability resides in the function sub_48F4F0 within the /H5/versionupdate.data file. An attacker can remotely exploit this flaw without requiring authentication or user interaction, leveraging network access to the device. The vulnerability allows unauthorized disclosure of potentially sensitive information stored or processed by the device. Although the exact nature of the leaked information is not detailed, information disclosure vulnerabilities typically expose configuration details, firmware versions, or other data that could facilitate further attacks. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts confidentiality (VC:L) but not integrity or availability. There is no indication that the vulnerability has been exploited in the wild yet, but a public exploit is available, increasing the risk of exploitation. No official patches or mitigation links have been provided at this time, which suggests that affected organizations need to implement compensating controls until a vendor fix is released.

Potential Impact

For European organizations, the impact of this vulnerability can be significant depending on the deployment scale of the D-Link DI-7003GV2 routers. Information disclosure can lead to exposure of sensitive network configuration, firmware details, or other internal data that attackers can use to plan more sophisticated attacks such as targeted intrusions, lateral movement, or exploitation of other vulnerabilities. This risk is particularly relevant for enterprises, ISPs, and critical infrastructure operators using this model. The remote, unauthenticated nature of the exploit means attackers can attempt to compromise devices from anywhere, increasing the attack surface. While the vulnerability does not directly affect system integrity or availability, the leaked information could facilitate subsequent attacks that do. Given the lack of patches, organizations face a window of exposure that could be exploited by threat actors, including cybercriminals or state-sponsored groups targeting European networks. The medium severity rating suggests a moderate but non-trivial risk, warranting prompt attention to reduce potential exposure.

Mitigation Recommendations

1. Network Segmentation: Isolate D-Link DI-7003GV2 devices from public-facing networks and restrict access to trusted management networks only. 2. Access Control: Implement strict firewall rules to limit inbound traffic to the device’s management interfaces, allowing only authorized IP addresses. 3. Monitoring and Detection: Deploy network monitoring tools to detect unusual traffic patterns or attempts to access the vulnerable function. 4. Firmware Updates: Regularly check D-Link’s official channels for firmware updates or security advisories addressing this vulnerability and apply patches immediately upon release. 5. Device Replacement: For critical environments, consider replacing affected devices with models that have no known vulnerabilities or have received security updates. 6. Incident Response Preparation: Prepare to respond to potential exploitation attempts by having logs and forensic capabilities in place to investigate suspicious activity. 7. Vendor Engagement: Contact D-Link support to inquire about timelines for patches or recommended mitigations specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-17T13:06:13.410Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb810

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 8:34:33 PM

Last updated: 7/31/2025, 5:28:52 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats