CVE-2025-55848: n/a
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
AI Analysis
Technical Summary
CVE-2025-55848 is a critical remote code execution (RCE) vulnerability identified in the firmware version 20250416 of the DIR-823 device, which is likely a network router or similar embedded device. The vulnerability arises from improper input sanitization in the 'set_cassword' settings interface, specifically in the 'http_casswd' parameter. This parameter fails to filter the ampersand character ('&'), which allows an attacker to inject additional shell commands. By exploiting this flaw, an attacker can execute arbitrary commands remotely without requiring authentication or user interaction. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection. The CVSS v3.1 score is 8.8 (high severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed over the network with low attack complexity, no privileges, and no user interaction, impacting confidentiality, integrity, and availability severely. No patches or fixes have been published yet, and no known exploits are currently observed in the wild. However, given the nature of the vulnerability and the high CVSS score, it poses a significant risk to affected devices and networks.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on DIR-823 devices in their network infrastructure. Successful exploitation could allow attackers to gain full control over the affected device, leading to potential network compromise, data exfiltration, lateral movement within corporate networks, disruption of network services, and deployment of further malware or ransomware. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the risk of widespread compromise. Critical infrastructure operators, enterprises, and service providers using these devices could face operational disruptions and data breaches. Additionally, compromised routers can be leveraged as entry points for attacks on connected systems or as part of botnets, amplifying the threat landscape in Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately audit their networks to identify the presence of DIR-823 devices running the vulnerable firmware version 20250416. Network segmentation should be enforced to isolate such devices from critical systems. Access to the management interfaces of these devices should be restricted using firewall rules to allow only trusted IP addresses. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying command injection attempts targeting the 'http_casswd' parameter. Organizations should consider disabling remote management features if not strictly necessary. Monitoring network traffic for unusual outbound connections that may indicate reverse shell activity is critical. Until a vendor patch is available, replacing vulnerable devices with updated or alternative hardware should be considered for high-risk environments. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-55848: n/a
Description
An issue was discovered in DIR-823 firmware 20250416. There is an RCE vulnerability in the set_cassword settings interface, as the http_casswd parameter is not filtered by '&'to allow injection of reverse connection commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-55848 is a critical remote code execution (RCE) vulnerability identified in the firmware version 20250416 of the DIR-823 device, which is likely a network router or similar embedded device. The vulnerability arises from improper input sanitization in the 'set_cassword' settings interface, specifically in the 'http_casswd' parameter. This parameter fails to filter the ampersand character ('&'), which allows an attacker to inject additional shell commands. By exploiting this flaw, an attacker can execute arbitrary commands remotely without requiring authentication or user interaction. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection. The CVSS v3.1 score is 8.8 (high severity), with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed over the network with low attack complexity, no privileges, and no user interaction, impacting confidentiality, integrity, and availability severely. No patches or fixes have been published yet, and no known exploits are currently observed in the wild. However, given the nature of the vulnerability and the high CVSS score, it poses a significant risk to affected devices and networks.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on DIR-823 devices in their network infrastructure. Successful exploitation could allow attackers to gain full control over the affected device, leading to potential network compromise, data exfiltration, lateral movement within corporate networks, disruption of network services, and deployment of further malware or ransomware. The lack of authentication and user interaction requirements means attackers can exploit this remotely and silently, increasing the risk of widespread compromise. Critical infrastructure operators, enterprises, and service providers using these devices could face operational disruptions and data breaches. Additionally, compromised routers can be leveraged as entry points for attacks on connected systems or as part of botnets, amplifying the threat landscape in Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately audit their networks to identify the presence of DIR-823 devices running the vulnerable firmware version 20250416. Network segmentation should be enforced to isolate such devices from critical systems. Access to the management interfaces of these devices should be restricted using firewall rules to allow only trusted IP addresses. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying command injection attempts targeting the 'http_casswd' parameter. Organizations should consider disabling remote management features if not strictly necessary. Monitoring network traffic for unusual outbound connections that may indicate reverse shell activity is critical. Until a vendor patch is available, replacing vulnerable devices with updated or alternative hardware should be considered for high-risk environments. Finally, maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d6fa2b4787b50b9b4329ce
Added to database: 9/26/2025, 8:40:11 PM
Last enriched: 10/4/2025, 12:38:18 AM
Last updated: 11/8/2025, 1:19:12 AM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64486: CWE-73: External Control of File Name or Path in kovidgoyal calibre
CriticalCVE-2025-64485: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cvat-ai cvat
MediumCVE-2025-12911: Inappropriate implementation in Google Chrome
UnknownCVE-2025-12910: Inappropriate implementation in Google Chrome
UnknownCVE-2025-12909: Insufficient policy enforcement in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.