CVE-2025-56311: n/a
In Shenzhen C-Data Technology Co. FD602GW-DX-R410 (firmware v2.2.14), the web management interface contains an authenticated CSRF vulnerability on the reboot endpoint (/boaform/admin/formReboot). An attacker can craft a malicious webpage that, when visited by an authenticated administrator, causes the router to reboot without explicit user consent. This lack of CSRF protection on a sensitive administrative function can lead to denial of service by disrupting network availability.
AI Analysis
Technical Summary
CVE-2025-56311 is a security vulnerability identified in the web management interface of the Shenzhen C-Data Technology Co. FD602GW-DX-R410 router, specifically in firmware version 2.2.14. The vulnerability is an authenticated Cross-Site Request Forgery (CSRF) issue affecting the reboot endpoint (/boaform/admin/formReboot). CSRF vulnerabilities occur when a web application does not adequately verify that requests to sensitive functions originate from legitimate users. In this case, an attacker can craft a malicious webpage that, when visited by an authenticated administrator of the router, triggers an unintended reboot of the device without explicit user consent. This vulnerability requires the attacker to lure an authenticated administrator to visit the malicious page, leveraging their active session to execute the reboot command. The lack of CSRF protection on this critical administrative function means that the router can be forced to reboot repeatedly or at inopportune times, causing denial of service (DoS) by disrupting network availability. While the vulnerability does not allow direct remote code execution or data exfiltration, the forced reboot can interrupt network connectivity, affecting all devices relying on the router. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability is limited to authenticated users, meaning an attacker must first compromise or trick an administrator into visiting the malicious page. This vulnerability highlights the importance of implementing CSRF tokens or other anti-CSRF mechanisms on sensitive administrative endpoints in embedded device web interfaces.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability and operational continuity. Organizations using the affected Shenzhen C-Data FD602GW-DX-R410 routers could experience repeated or unexpected network outages if an attacker successfully exploits this vulnerability. This can disrupt business operations, especially for enterprises relying on continuous internet connectivity or internal network services. Critical infrastructure sectors, such as telecommunications providers, utilities, or financial institutions using these routers, may face increased operational risk. Although the attack requires an authenticated administrator to be tricked into visiting a malicious webpage, social engineering or phishing campaigns targeting network administrators could facilitate exploitation. The resulting denial of service could also impact remote work capabilities, cloud service access, and internal communications. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can have cascading effects on organizational productivity and incident response capabilities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately restrict administrative access to the router's web interface by implementing network segmentation and limiting access to trusted management networks or VPNs. 2) Educate network administrators about the risks of phishing and social engineering attacks that could lead to visiting malicious webpages while authenticated. 3) Monitor and log administrative access to detect unusual activity or repeated reboots. 4) Apply firmware updates or patches from Shenzhen C-Data Technology as soon as they become available; if no patch exists, contact the vendor for guidance or consider replacing affected devices. 5) Implement multi-factor authentication (MFA) for router administration to reduce the risk of compromised credentials. 6) Use web application firewalls or intrusion prevention systems to detect and block CSRF attack patterns targeting the router's management interface. 7) Consider disabling the web management interface if alternative management methods (e.g., SSH, SNMP) are available and secure. These steps go beyond generic advice by focusing on access control, user awareness, and proactive monitoring tailored to the specific nature of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-56311: n/a
Description
In Shenzhen C-Data Technology Co. FD602GW-DX-R410 (firmware v2.2.14), the web management interface contains an authenticated CSRF vulnerability on the reboot endpoint (/boaform/admin/formReboot). An attacker can craft a malicious webpage that, when visited by an authenticated administrator, causes the router to reboot without explicit user consent. This lack of CSRF protection on a sensitive administrative function can lead to denial of service by disrupting network availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-56311 is a security vulnerability identified in the web management interface of the Shenzhen C-Data Technology Co. FD602GW-DX-R410 router, specifically in firmware version 2.2.14. The vulnerability is an authenticated Cross-Site Request Forgery (CSRF) issue affecting the reboot endpoint (/boaform/admin/formReboot). CSRF vulnerabilities occur when a web application does not adequately verify that requests to sensitive functions originate from legitimate users. In this case, an attacker can craft a malicious webpage that, when visited by an authenticated administrator of the router, triggers an unintended reboot of the device without explicit user consent. This vulnerability requires the attacker to lure an authenticated administrator to visit the malicious page, leveraging their active session to execute the reboot command. The lack of CSRF protection on this critical administrative function means that the router can be forced to reboot repeatedly or at inopportune times, causing denial of service (DoS) by disrupting network availability. While the vulnerability does not allow direct remote code execution or data exfiltration, the forced reboot can interrupt network connectivity, affecting all devices relying on the router. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability is limited to authenticated users, meaning an attacker must first compromise or trick an administrator into visiting the malicious page. This vulnerability highlights the importance of implementing CSRF tokens or other anti-CSRF mechanisms on sensitive administrative endpoints in embedded device web interfaces.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to network availability and operational continuity. Organizations using the affected Shenzhen C-Data FD602GW-DX-R410 routers could experience repeated or unexpected network outages if an attacker successfully exploits this vulnerability. This can disrupt business operations, especially for enterprises relying on continuous internet connectivity or internal network services. Critical infrastructure sectors, such as telecommunications providers, utilities, or financial institutions using these routers, may face increased operational risk. Although the attack requires an authenticated administrator to be tricked into visiting a malicious webpage, social engineering or phishing campaigns targeting network administrators could facilitate exploitation. The resulting denial of service could also impact remote work capabilities, cloud service access, and internal communications. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can have cascading effects on organizational productivity and incident response capabilities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately restrict administrative access to the router's web interface by implementing network segmentation and limiting access to trusted management networks or VPNs. 2) Educate network administrators about the risks of phishing and social engineering attacks that could lead to visiting malicious webpages while authenticated. 3) Monitor and log administrative access to detect unusual activity or repeated reboots. 4) Apply firmware updates or patches from Shenzhen C-Data Technology as soon as they become available; if no patch exists, contact the vendor for guidance or consider replacing affected devices. 5) Implement multi-factor authentication (MFA) for router administration to reduce the risk of compromised credentials. 6) Use web application firewalls or intrusion prevention systems to detect and block CSRF attack patterns targeting the router's management interface. 7) Consider disabling the web management interface if alternative management methods (e.g., SSH, SNMP) are available and secure. These steps go beyond generic advice by focusing on access control, user awareness, and proactive monitoring tailored to the specific nature of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d301ca02d8cd39a20f2f56
Added to database: 9/23/2025, 8:23:38 PM
Last enriched: 9/23/2025, 8:23:58 PM
Last updated: 10/7/2025, 5:41:19 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11362: Allocation of Resources Without Limits or Throttling in pdfmake
HighCVE-2025-11352: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-11351: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-11350: SQL Injection in Campcodes Online Apartment Visitor Management System
MediumCVE-2025-27915: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.