Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52079: n/a

0
High
VulnerabilityCVE-2025-52079cvecve-2025-52079
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The administrator password setting of the D-Link DIR-820L 1.06B02 is has Improper Access Control and is vulnerable to Unverified Password Change via crafted POST request to /get_set.ccp.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:01:43 UTC

Technical Analysis

CVE-2025-52079 is a vulnerability identified in the D-Link DIR-820L router firmware version 1.06B02, characterized by improper access control (CWE-284). The flaw allows an attacker who has at least limited privileges (PR:L) to perform an unverified password change on the administrator account by sending a specially crafted POST request to the /get_set.ccp endpoint. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 8.8, indicating a high severity level due to the potential for complete compromise of the device's confidentiality, integrity, and availability (C:H/I:H/A:H). The attacker can effectively take over the router by changing the admin password without authentication verification, which could lead to persistent unauthorized access, interception or redirection of network traffic, and disruption of network services. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be weaponized by attackers targeting home or small office networks using this router model. The lack of a patch at the time of publication increases the urgency for mitigation through alternative controls.

Potential Impact

For European organizations, especially small and medium enterprises or home offices relying on the D-Link DIR-820L router, this vulnerability poses a significant risk. An attacker exploiting this flaw can gain full administrative control over the router, enabling them to manipulate network configurations, intercept sensitive data, deploy malware, or disrupt network availability. This can lead to data breaches, loss of business continuity, and compromise of connected devices. Critical infrastructure or organizations with remote workforce setups using vulnerable routers may face increased exposure to espionage or ransomware attacks. The widespread use of D-Link devices in Europe, combined with the high severity of this vulnerability, means that the potential impact on confidentiality, integrity, and availability of network communications is substantial.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement the following mitigations: 1) Immediately restrict access to the router’s management interface by limiting it to trusted internal IP addresses and disabling remote management features. 2) Monitor network traffic for unusual POST requests targeting /get_set.ccp or other suspicious activity indicative of exploitation attempts. 3) Segment networks to isolate vulnerable routers from critical systems and sensitive data. 4) Change default credentials on all network devices and enforce strong password policies to reduce the risk of privilege escalation. 5) Regularly check for firmware updates from D-Link and apply patches as soon as they are released. 6) Consider replacing vulnerable devices with models that have a stronger security posture if patching is delayed. 7) Educate users about the risks of unauthorized network access and encourage reporting of anomalies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7e1720ecb6bf811944a6b

Added to database: 10/21/2025, 7:39:30 PM

Last enriched: 10/28/2025, 10:01:43 PM

Last updated: 12/7/2025, 2:25:11 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats