CVE-2025-60673: n/a
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
AI Analysis
Technical Summary
CVE-2025-60673 is a critical unauthenticated command injection vulnerability found in the D-Link DIR-878A1 router firmware version FW101B04.bin. The flaw exists in the 'SetDMZSettings' functionality exposed via the prog.cgi interface. Specifically, the 'IPAddress' parameter is accepted from an HTTP request and stored directly into the router's NVRAM without proper validation or sanitization. Later, the vulnerable library librcm.so reads this stored IP address and uses it to construct iptables firewall commands, which are executed through the twsystem() function. Because twsystem() executes shell commands, an attacker can inject arbitrary shell commands by manipulating the 'IPAddress' parameter. This vulnerability can be exploited remotely without any authentication or user interaction, making it highly dangerous. Successful exploitation grants the attacker arbitrary command execution on the router, allowing them to manipulate network traffic, install persistent malware, or pivot into internal networks. The vulnerability was reserved in late September 2025 and published in November 2025, but no official CVSS score or patch links are available yet. There are no known exploits in the wild at the time of publication, but the ease of exploitation and potential impact make it a significant threat. The lack of authentication and the direct execution of attacker-controlled input in system commands highlight a severe design flaw in the firmware's input validation and command execution logic.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to network security and operational continuity. Compromise of the D-Link DIR-878A1 routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Critical infrastructure sectors such as finance, healthcare, government, and telecommunications that rely on these routers for perimeter defense or internal segmentation could face severe operational impacts. Attackers could establish persistent backdoors, launch further attacks within the network, or exfiltrate confidential information. The unauthenticated nature of the exploit means attackers can target devices exposed to the internet or accessible from less secure network segments without needing credentials, increasing the attack surface. Additionally, the exploitation could facilitate large-scale botnet recruitment or distributed denial-of-service (DDoS) attacks originating from compromised routers. The absence of a patch at publication heightens the urgency for organizations to implement interim mitigations to protect their networks.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement network-level protections to mitigate this vulnerability. These include restricting access to the router's management interfaces (prog.cgi) by limiting exposure to trusted internal networks and blocking external HTTP requests targeting these endpoints via firewalls or intrusion prevention systems. Network segmentation should be enforced to isolate vulnerable routers from critical assets. Monitoring network traffic for unusual or malformed HTTP requests targeting the 'SetDMZSettings' functionality can help detect exploitation attempts. Organizations should disable remote management features on the affected routers if not strictly necessary. Where possible, replace vulnerable devices with updated models or firmware versions once available. Vendors and security teams should collaborate to expedite firmware patch development and deployment. Additionally, applying strict input validation and command execution safeguards in future firmware updates is essential to prevent similar vulnerabilities. Regular security audits and vulnerability assessments of network devices should be conducted to identify and remediate such risks proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-60673: n/a
Description
An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-60673 is a critical unauthenticated command injection vulnerability found in the D-Link DIR-878A1 router firmware version FW101B04.bin. The flaw exists in the 'SetDMZSettings' functionality exposed via the prog.cgi interface. Specifically, the 'IPAddress' parameter is accepted from an HTTP request and stored directly into the router's NVRAM without proper validation or sanitization. Later, the vulnerable library librcm.so reads this stored IP address and uses it to construct iptables firewall commands, which are executed through the twsystem() function. Because twsystem() executes shell commands, an attacker can inject arbitrary shell commands by manipulating the 'IPAddress' parameter. This vulnerability can be exploited remotely without any authentication or user interaction, making it highly dangerous. Successful exploitation grants the attacker arbitrary command execution on the router, allowing them to manipulate network traffic, install persistent malware, or pivot into internal networks. The vulnerability was reserved in late September 2025 and published in November 2025, but no official CVSS score or patch links are available yet. There are no known exploits in the wild at the time of publication, but the ease of exploitation and potential impact make it a significant threat. The lack of authentication and the direct execution of attacker-controlled input in system commands highlight a severe design flaw in the firmware's input validation and command execution logic.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to network security and operational continuity. Compromise of the D-Link DIR-878A1 routers could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, and disruption of network services. Critical infrastructure sectors such as finance, healthcare, government, and telecommunications that rely on these routers for perimeter defense or internal segmentation could face severe operational impacts. Attackers could establish persistent backdoors, launch further attacks within the network, or exfiltrate confidential information. The unauthenticated nature of the exploit means attackers can target devices exposed to the internet or accessible from less secure network segments without needing credentials, increasing the attack surface. Additionally, the exploitation could facilitate large-scale botnet recruitment or distributed denial-of-service (DDoS) attacks originating from compromised routers. The absence of a patch at publication heightens the urgency for organizations to implement interim mitigations to protect their networks.
Mitigation Recommendations
Given the absence of an official patch, European organizations should immediately implement network-level protections to mitigate this vulnerability. These include restricting access to the router's management interfaces (prog.cgi) by limiting exposure to trusted internal networks and blocking external HTTP requests targeting these endpoints via firewalls or intrusion prevention systems. Network segmentation should be enforced to isolate vulnerable routers from critical assets. Monitoring network traffic for unusual or malformed HTTP requests targeting the 'SetDMZSettings' functionality can help detect exploitation attempts. Organizations should disable remote management features on the affected routers if not strictly necessary. Where possible, replace vulnerable devices with updated models or firmware versions once available. Vendors and security teams should collaborate to expedite firmware patch development and deployment. Additionally, applying strict input validation and command execution safeguards in future firmware updates is essential to prevent similar vulnerabilities. Regular security audits and vulnerability assessments of network devices should be conducted to identify and remediate such risks proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69162b1819431ce75c56943a
Added to database: 11/13/2025, 7:01:44 PM
Last enriched: 11/13/2025, 7:17:13 PM
Last updated: 11/15/2025, 11:07:03 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2448
UnknownCVE-2025-13221: Unprotected Storage of Credentials in Intelbras UnniTI
MediumCVE-2025-13209: XML External Entity Reference in bestfeng oa_git_free
MediumCVE-2025-13210: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-13208: SQL Injection in FantasticLBP Hotels Server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.