CVE-2025-55848: n/a
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
AI Analysis
Technical Summary
CVE-2025-55848 is a remote code execution (RCE) vulnerability identified in the firmware version 20250416 of the DIR-823 device. The vulnerability arises from improper input validation in the set_cassword settings interface, specifically in the http_casswd parameter. This parameter fails to filter the ampersand character ('&'), which allows an attacker to inject additional commands, including reverse shell commands, leading to arbitrary code execution on the affected device. The vulnerability is classified under CWE-77, which relates to command injection flaws. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and it impacts confidentiality and integrity with no effect on availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability allows an unauthenticated attacker to remotely execute commands by exploiting the lack of proper sanitization in the HTTP parameter, potentially compromising the device and any network it is connected to.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on DIR-823 devices within their network infrastructure. Successful exploitation could allow attackers to gain unauthorized access to the device, leading to potential data leakage (confidentiality impact) and unauthorized modification of device configurations or network traffic (integrity impact). Although availability is not directly affected, compromised devices could be used as footholds for lateral movement or as part of botnets, increasing the overall threat landscape. Organizations in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government, could face elevated risks. The lack of authentication requirement and user interaction makes the attack easier to execute remotely, increasing the likelihood of exploitation if devices are exposed to untrusted networks or the internet.
Mitigation Recommendations
Organizations should immediately assess their network for the presence of DIR-823 devices running the vulnerable firmware version 20250416. Since no official patches are currently available, mitigation should focus on network-level controls: restrict access to the device management interface by implementing firewall rules that limit management access to trusted IP addresses only; disable remote management features if not required; monitor network traffic for unusual outbound connections that may indicate exploitation attempts; and implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts. Additionally, organizations should engage with the vendor for firmware updates and apply patches as soon as they become available. Regularly auditing device configurations and maintaining an asset inventory will help in timely identification and remediation of vulnerable devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-55848: n/a
Description
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-55848 is a remote code execution (RCE) vulnerability identified in the firmware version 20250416 of the DIR-823 device. The vulnerability arises from improper input validation in the set_cassword settings interface, specifically in the http_casswd parameter. This parameter fails to filter the ampersand character ('&'), which allows an attacker to inject additional commands, including reverse shell commands, leading to arbitrary code execution on the affected device. The vulnerability is classified under CWE-77, which relates to command injection flaws. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and it impacts confidentiality and integrity with no effect on availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability allows an unauthenticated attacker to remotely execute commands by exploiting the lack of proper sanitization in the HTTP parameter, potentially compromising the device and any network it is connected to.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on DIR-823 devices within their network infrastructure. Successful exploitation could allow attackers to gain unauthorized access to the device, leading to potential data leakage (confidentiality impact) and unauthorized modification of device configurations or network traffic (integrity impact). Although availability is not directly affected, compromised devices could be used as footholds for lateral movement or as part of botnets, increasing the overall threat landscape. Organizations in sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government, could face elevated risks. The lack of authentication requirement and user interaction makes the attack easier to execute remotely, increasing the likelihood of exploitation if devices are exposed to untrusted networks or the internet.
Mitigation Recommendations
Organizations should immediately assess their network for the presence of DIR-823 devices running the vulnerable firmware version 20250416. Since no official patches are currently available, mitigation should focus on network-level controls: restrict access to the device management interface by implementing firewall rules that limit management access to trusted IP addresses only; disable remote management features if not required; monitor network traffic for unusual outbound connections that may indicate exploitation attempts; and implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting command injection attempts. Additionally, organizations should engage with the vendor for firmware updates and apply patches as soon as they become available. Regularly auditing device configurations and maintaining an asset inventory will help in timely identification and remediation of vulnerable devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d6fa2b4787b50b9b4329ce
Added to database: 9/26/2025, 8:40:11 PM
Last enriched: 9/26/2025, 8:40:39 PM
Last updated: 9/28/2025, 12:09:51 AM
Views: 7
Related Threats
CVE-2025-11090: SQL Injection in itsourcecode Open Source Job Portal
MediumCVE-2025-11089: SQL Injection in kidaze CourseSelectionSystem
MediumCVE-2025-11049: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-3193: Prototype Pollution in algoliasearch-helper
MediumCVE-2025-10954: Improper Validation of Syntactic Correctness of Input in github.com/nyaruka/phonenumbers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.