Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60344: n/a

0
Medium
VulnerabilityCVE-2025-60344cvecve-2025-60344
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated Local File Inclusion (LFI) vulnerability in D-Link DSR series routers allows remote attackers to retrieve sensitive configuration files in clear text. The exposed files contain administrative credentials, VPN settings, and other sensitive information, enabling full administrative access to the router. Affected Products include: DSR-150, DSR-150N, and DSR-250N v1.09B32_WW.

AI-Powered Analysis

AILast updated: 10/21/2025, 15:35:39 UTC

Technical Analysis

CVE-2025-60344 is a Local File Inclusion (LFI) vulnerability found in specific versions of D-Link DSR series routers, specifically the DSR-150, DSR-150N, and DSR-250N running firmware version 1.09B32_WW. The vulnerability allows an unauthenticated remote attacker to exploit the LFI flaw to access sensitive configuration files stored on the device. These files contain highly sensitive information such as administrative credentials, VPN configuration details, and other critical router settings. By retrieving these files in clear text, an attacker can gain full administrative access to the router, effectively compromising the device and potentially the entire network it protects. The vulnerability does not require any authentication or user interaction, making it highly accessible for exploitation. Although no public exploits or active attacks have been reported yet, the exposure of such sensitive data presents a severe security risk. The affected routers are commonly used in small to medium business environments and possibly in some enterprise edge deployments. The lack of a CVSS score indicates that the vulnerability is newly published, and no formal severity rating has been assigned yet. However, the technical details and potential impact clearly indicate a critical security issue that demands immediate attention from affected users and administrators.

Potential Impact

For European organizations, the impact of CVE-2025-60344 can be severe. The ability for an unauthenticated attacker to retrieve administrative credentials and VPN settings compromises the confidentiality and integrity of the network infrastructure. Attackers gaining full administrative access to routers can manipulate network traffic, intercept sensitive communications, deploy malware, or create persistent backdoors. This can lead to data breaches, disruption of business operations, and loss of trust. Organizations relying on these D-Link routers for VPN connectivity may have their secure remote access channels compromised, exposing internal resources to external attackers. The vulnerability also threatens availability if attackers modify router configurations or cause denial-of-service conditions. Given the critical role of routers in network security and connectivity, exploitation could have cascading effects on organizational cybersecurity posture, regulatory compliance, and operational continuity.

Mitigation Recommendations

1. Immediately restrict access to the router management interfaces to trusted internal networks and disable remote management if not necessary. 2. Monitor network traffic and router logs for unusual access patterns or attempts to access configuration files. 3. Apply firmware updates or patches from D-Link as soon as they become available to address this vulnerability. 4. If patches are not yet available, consider temporarily replacing affected routers with devices from other vendors or newer models not affected by this flaw. 5. Implement network segmentation to isolate critical infrastructure and limit the impact of a compromised router. 6. Use strong, unique administrative passwords and enable multi-factor authentication where supported. 7. Conduct regular security audits and vulnerability assessments on network devices to detect similar issues proactively. 8. Educate IT staff on the risks of LFI vulnerabilities and the importance of timely patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7a4cea08cdec950718deb

Added to database: 10/21/2025, 3:20:46 PM

Last enriched: 10/21/2025, 3:35:39 PM

Last updated: 10/24/2025, 2:54:29 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats