Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56311: n/a

0
Medium
VulnerabilityCVE-2025-56311cvecve-2025-56311
Published: Tue Sep 23 2025 (09/23/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In Shenzhen C-Data Technology Co. FD602GW-DX-R410 (firmware v2.2.14), the web management interface contains an authenticated CSRF vulnerability on the reboot endpoint (/boaform/admin/formReboot). An attacker can craft a malicious webpage that, when visited by an authenticated administrator, causes the router to reboot without explicit user consent. This lack of CSRF protection on a sensitive administrative function can lead to denial of service by disrupting network availability.

AI-Powered Analysis

AILast updated: 10/28/2025, 20:45:21 UTC

Technical Analysis

CVE-2025-56311 identifies a security vulnerability in the FD602GW-DX-R410 router by Shenzhen C-Data Technology Co., specifically in firmware version 2.2.14. The issue is an authenticated Cross-Site Request Forgery (CSRF) vulnerability affecting the router's web management interface reboot endpoint (/boaform/admin/formReboot). CSRF vulnerabilities occur when a web application does not verify that requests to sensitive functions originate from legitimate sources, allowing attackers to trick authenticated users into executing unwanted actions. In this case, an attacker crafts a malicious webpage that, when visited by an authenticated administrator, triggers the router to reboot without explicit consent. This forced reboot can cause temporary denial of service by disrupting network connectivity. The vulnerability requires the attacker to have the administrator logged into the router's management interface and to entice them to visit the malicious page, making social engineering a component of the attack vector. The CVSS v3.1 score of 6.5 reflects a medium severity, considering the network attack vector, low attack complexity, and no user interaction beyond visiting the malicious page. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery). No patches or known exploits have been reported at the time of publication, indicating that organizations should proactively assess and mitigate this risk. The lack of CSRF tokens or other anti-CSRF mechanisms on the reboot endpoint is the root cause. This vulnerability primarily impacts network availability and could be leveraged to disrupt business operations reliant on continuous network uptime.

Potential Impact

For European organizations, this vulnerability poses a risk of network disruption through forced router reboots, potentially causing temporary denial of service. Organizations relying on Shenzhen C-Data FD602GW-DX-R410 routers in critical infrastructure, enterprise networks, or service provider environments could experience interruptions in connectivity, impacting business continuity and operational efficiency. The requirement for authenticated access limits the attack surface to insiders or attackers who have compromised administrator credentials or can socially engineer administrators into visiting malicious sites. However, the ease of exploitation via a simple webpage visit increases the risk of successful attacks once credentials are compromised. Disruptions could affect sensitive sectors such as finance, healthcare, manufacturing, and government services, where network availability is crucial. Additionally, repeated forced reboots could degrade hardware reliability over time. The vulnerability does not directly compromise confidentiality or integrity but impacts availability, which is a critical component of cybersecurity for operational technology and enterprise networks.

Mitigation Recommendations

To mitigate CVE-2025-56311, organizations should first verify if they use the affected FD602GW-DX-R410 routers with firmware version 2.2.14. If so, they should contact Shenzhen C-Data Technology Co. for firmware updates or patches that implement proper CSRF protections such as anti-CSRF tokens on sensitive endpoints. In the absence of official patches, network administrators should restrict access to the router's web management interface by limiting it to trusted IP addresses or VPN-only access to reduce exposure. Implementing multi-factor authentication (MFA) for administrative access can reduce the risk of credential compromise. Administrators should be trained to avoid visiting untrusted websites while logged into router management interfaces to prevent social engineering exploitation. Monitoring router logs for unexpected reboots and unusual administrative activity can help detect exploitation attempts. Network segmentation can isolate critical routers from general user networks to limit attack vectors. Finally, organizations should maintain an inventory of network devices to quickly identify and remediate vulnerable equipment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d301ca02d8cd39a20f2f56

Added to database: 9/23/2025, 8:23:38 PM

Last enriched: 10/28/2025, 8:45:21 PM

Last updated: 11/20/2025, 3:19:01 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats