CVE-2025-60344: CWE-24 Path Traversal: '../filedir' in D-Link DSR-150
A path traversal (directory traversal) vulnerability in D-Link DSR series routers allows unauthenticated remote attackers to manipulate input parameters used for file or directory path resolution (e.g., via sequences such as “../”). Successful exploitation may allow access to files outside of the intended directory, potentially exposing sensitive system or configuration files. The issue results from insufficient validation or sanitization of user-supplied input. Affected Products include: DSR-150, DSR-150N, and DSR-250N v1.09B32_WW.
AI Analysis
Technical Summary
CVE-2025-60344 is a path traversal vulnerability identified in D-Link DSR series routers, including DSR-150, DSR-150N, and DSR-250N models running firmware version 1.09B32_WW. The vulnerability stems from improper validation and sanitization of user-supplied input parameters that are used to resolve file or directory paths. Attackers can exploit this by injecting directory traversal sequences such as '../' into these parameters, enabling them to navigate outside the intended directory structure. This can lead to unauthorized access to sensitive files, including system and configuration files, which may contain credentials, network configurations, or other critical information. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its severity and ease of exploitation. The CVSS v3.1 score of 8.6 reflects its high impact on confidentiality, with no impact on integrity or availability. Although no exploits have been reported in the wild yet, the vulnerability's characteristics make it a prime target for attackers seeking to gather intelligence or prepare for further attacks. The affected firmware version 1.09B32_WW is used in multiple D-Link router models, which are commonly deployed in enterprise and SMB environments, increasing the potential attack surface. The root cause is insufficient input validation in the router's web interface or API components responsible for file path handling. Without proper sanitization, attackers can craft malicious requests to access arbitrary files on the device's filesystem, bypassing intended access controls.
Potential Impact
The primary impact of CVE-2025-60344 is the unauthorized disclosure of sensitive information stored on affected D-Link routers. Attackers can access configuration files that may contain administrative credentials, network topology details, VPN configurations, or other sensitive data. This exposure can facilitate further attacks such as network intrusion, lateral movement, or persistent access. Since the vulnerability does not affect integrity or availability directly, it does not allow attackers to modify files or disrupt router operations, but the confidentiality breach alone can have severe consequences. Organizations relying on these routers for secure network perimeter enforcement or VPN termination may face increased risk of compromise. The ease of exploitation—no authentication or user interaction required—and network accessibility make this vulnerability particularly dangerous. Additionally, the vulnerability could be leveraged as a stepping stone for more complex attacks, including firmware manipulation or malware deployment if combined with other vulnerabilities. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score and broad deployment of affected devices suggest a significant potential impact if exploited.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations should check for and apply any official patches or firmware updates from D-Link addressing this vulnerability. If no patch is currently available, contact D-Link support for guidance or timelines. 2. Network segmentation: Isolate affected routers from untrusted networks and restrict management interface access to trusted administrative hosts only. 3. Access control: Implement strict firewall rules to limit inbound traffic to management ports and interfaces, reducing exposure to remote exploitation. 4. Input filtering: If possible, deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block directory traversal patterns in HTTP requests targeting the router. 5. Monitoring and logging: Enable detailed logging on routers and network devices to detect suspicious access attempts involving directory traversal sequences. 6. Replace or upgrade hardware: For environments where patching is not feasible, consider replacing affected devices with models that have no known vulnerabilities or have received timely security updates. 7. Vendor engagement: Maintain communication with D-Link for updates, advisories, and recommended security practices related to this vulnerability. 8. Incident response readiness: Prepare to investigate and respond to potential exploitation attempts, including forensic analysis of affected devices and network traffic.
Affected Countries
United States, Germany, United Kingdom, Australia, Canada, France, Japan, South Korea, Brazil, India
CVE-2025-60344: CWE-24 Path Traversal: '../filedir' in D-Link DSR-150
Description
A path traversal (directory traversal) vulnerability in D-Link DSR series routers allows unauthenticated remote attackers to manipulate input parameters used for file or directory path resolution (e.g., via sequences such as “../”). Successful exploitation may allow access to files outside of the intended directory, potentially exposing sensitive system or configuration files. The issue results from insufficient validation or sanitization of user-supplied input. Affected Products include: DSR-150, DSR-150N, and DSR-250N v1.09B32_WW.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-60344 is a path traversal vulnerability identified in D-Link DSR series routers, including DSR-150, DSR-150N, and DSR-250N models running firmware version 1.09B32_WW. The vulnerability stems from improper validation and sanitization of user-supplied input parameters that are used to resolve file or directory paths. Attackers can exploit this by injecting directory traversal sequences such as '../' into these parameters, enabling them to navigate outside the intended directory structure. This can lead to unauthorized access to sensitive files, including system and configuration files, which may contain credentials, network configurations, or other critical information. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing its severity and ease of exploitation. The CVSS v3.1 score of 8.6 reflects its high impact on confidentiality, with no impact on integrity or availability. Although no exploits have been reported in the wild yet, the vulnerability's characteristics make it a prime target for attackers seeking to gather intelligence or prepare for further attacks. The affected firmware version 1.09B32_WW is used in multiple D-Link router models, which are commonly deployed in enterprise and SMB environments, increasing the potential attack surface. The root cause is insufficient input validation in the router's web interface or API components responsible for file path handling. Without proper sanitization, attackers can craft malicious requests to access arbitrary files on the device's filesystem, bypassing intended access controls.
Potential Impact
The primary impact of CVE-2025-60344 is the unauthorized disclosure of sensitive information stored on affected D-Link routers. Attackers can access configuration files that may contain administrative credentials, network topology details, VPN configurations, or other sensitive data. This exposure can facilitate further attacks such as network intrusion, lateral movement, or persistent access. Since the vulnerability does not affect integrity or availability directly, it does not allow attackers to modify files or disrupt router operations, but the confidentiality breach alone can have severe consequences. Organizations relying on these routers for secure network perimeter enforcement or VPN termination may face increased risk of compromise. The ease of exploitation—no authentication or user interaction required—and network accessibility make this vulnerability particularly dangerous. Additionally, the vulnerability could be leveraged as a stepping stone for more complex attacks, including firmware manipulation or malware deployment if combined with other vulnerabilities. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score and broad deployment of affected devices suggest a significant potential impact if exploited.
Mitigation Recommendations
1. Immediate firmware upgrade: Organizations should check for and apply any official patches or firmware updates from D-Link addressing this vulnerability. If no patch is currently available, contact D-Link support for guidance or timelines. 2. Network segmentation: Isolate affected routers from untrusted networks and restrict management interface access to trusted administrative hosts only. 3. Access control: Implement strict firewall rules to limit inbound traffic to management ports and interfaces, reducing exposure to remote exploitation. 4. Input filtering: If possible, deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block directory traversal patterns in HTTP requests targeting the router. 5. Monitoring and logging: Enable detailed logging on routers and network devices to detect suspicious access attempts involving directory traversal sequences. 6. Replace or upgrade hardware: For environments where patching is not feasible, consider replacing affected devices with models that have no known vulnerabilities or have received timely security updates. 7. Vendor engagement: Maintain communication with D-Link for updates, advisories, and recommended security practices related to this vulnerability. 8. Incident response readiness: Prepare to investigate and respond to potential exploitation attempts, including forensic analysis of affected devices and network traffic.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f7a4cea08cdec950718deb
Added to database: 10/21/2025, 3:20:46 PM
Last enriched: 2/27/2026, 10:58:51 PM
Last updated: 3/26/2026, 6:52:54 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.