Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55848: n/a

0
High
VulnerabilityCVE-2025-55848cvecve-2025-55848
Published: Fri Sep 26 2025 (09/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.

AI-Powered Analysis

AILast updated: 10/04/2025, 00:38:18 UTC

Technical Analysis

CVE-2025-55848 is a critical remote code execution (RCE) vulnerability identified in the firmware version 20250416 of the DIR-823 device, which is likely a network router or similar embedded device. The vulnerability arises from improper input sanitization in the 'set_cassword' settings interface, specifically in the 'http_casswd' parameter. This parameter fails to filter the ampersand character ('&'), which allows an attacker to inject additional shell commands. By exploiting this flaw, an attacker can execute arbitrary commands remotely without requiring authentication or user interaction. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection. The CVSS v3.1 score is 8.8 (high severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed over the network with low attack complexity, no privileges, and no user interaction, impacting confidentiality, integrity, and availability severely. No patches or fixes have been published yet, and no known exploits are currently observed in the wild. However, given the nature of the vulnerability and the high CVSS score, it poses a significant risk to affected devices and networks.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for those relying on DIR-823 devices in their network infrastructure. Successful exploitation could allow attackers to gain full control over the affected device, leading to potential network compromise, data exfiltration, lateral movement within corporate networks, disruption of network services, and deployment of further malware or ransomware. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the risk of widespread compromise. Critical infrastructure operators, enterprises, and service providers using these devices could face operational disruptions and data breaches. Additionally, compromised routers can be leveraged as entry points for attacks on connected systems or as part of botnets, amplifying the threat landscape in Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately audit their networks to identify the presence of DIR-823 devices running the vulnerable firmware version 20250416. Network segmentation should be enforced to isolate such devices from critical systems. Access to the management interfaces of these devices should be restricted using firewall rules to allow only trusted IP addresses. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying command injection attempts targeting the 'http_casswd' parameter. Organizations should consider disabling remote management features if not strictly necessary. Monitoring network traffic for unusual outbound connections that may indicate reverse shell activity is critical. Until a vendor patch is available, replacing vulnerable devices with updated or alternative hardware should be considered for high-risk environments. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d6fa2b4787b50b9b4329ce

Added to database: 9/26/2025, 8:40:11 PM

Last enriched: 10/4/2025, 12:38:18 AM

Last updated: 11/8/2025, 1:19:12 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats