Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60673: n/a

0
Medium
VulnerabilityCVE-2025-60673cvecve-2025-60673
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

AI-Powered Analysis

AILast updated: 11/13/2025, 19:17:13 UTC

Technical Analysis

CVE-2025-60673 is a critical unauthenticated command injection vulnerability found in the D-Link DIR-878A1 router firmware version FW101B04.bin. The flaw exists in the 'SetDMZSettings' functionality exposed via the prog.cgi interface. Specifically, the 'IPAddress' parameter is accepted from an HTTP request and stored directly into the router's NVRAM without proper validation or sanitization. Later, the vulnerable library librcm.so reads this stored IP address and uses it to construct iptables firewall commands, which are executed through the twsystem() function. Because twsystem() executes shell commands, an attacker can inject arbitrary shell commands by manipulating the 'IPAddress' parameter. This vulnerability can be exploited remotely without any authentication or user interaction, making it highly dangerous. Successful exploitation grants the attacker arbitrary command execution on the router, allowing them to manipulate network traffic, install persistent malware, or pivot into internal networks. The vulnerability was reserved in late September 2025 and published in November 2025, but no official CVSS score or patch links are available yet. There are no known exploits in the wild at the time of publication, but the ease of exploitation and potential impact make it a significant threat. The lack of authentication and the direct execution of attacker-controlled input in system commands highlight a severe design flaw in the firmware's input validation and command execution logic.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to network security and operational continuity. Compromise of the D-Link DIR-878A1 routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Critical infrastructure sectors such as finance, healthcare, government, and telecommunications that rely on these routers for perimeter defense or internal segmentation could face severe operational impacts. Attackers could establish persistent backdoors, launch further attacks within the network, or exfiltrate confidential information. The unauthenticated nature of the exploit means attackers can target devices exposed to the internet or accessible from less secure network segments without needing credentials, increasing the attack surface. Additionally, the exploitation could facilitate large-scale botnet recruitment or distributed denial-of-service (DDoS) attacks originating from compromised routers. The absence of a patch at publication heightens the urgency for organizations to implement interim mitigations to protect their networks.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement network-level protections to mitigate this vulnerability. These include restricting access to the router's management interfaces (prog.cgi) by limiting exposure to trusted internal networks and blocking external HTTP requests targeting these endpoints via firewalls or intrusion prevention systems. Network segmentation should be enforced to isolate vulnerable routers from critical assets. Monitoring network traffic for unusual or malformed HTTP requests targeting the 'SetDMZSettings' functionality can help detect exploitation attempts. Organizations should disable remote management features on the affected routers if not strictly necessary. Where possible, replace vulnerable devices with updated models or firmware versions once available. Vendors and security teams should collaborate to expedite firmware patch development and deployment. Additionally, applying strict input validation and command execution safeguards in future firmware updates is essential to prevent similar vulnerabilities. Regular security audits and vulnerability assessments of network devices should be conducted to identify and remediate such risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162b1819431ce75c56943a

Added to database: 11/13/2025, 7:01:44 PM

Last enriched: 11/13/2025, 7:17:13 PM

Last updated: 11/15/2025, 11:07:03 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats