CVE-2025-60674: n/a
A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.
AI Analysis
Technical Summary
CVE-2025-60674 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin, specifically within the rc binary's USB storage handling module. The vulnerability stems from unsafe parsing of the "Serial Number" field of a USB device. The code uses fgets to read up to 127 bytes from the USB device's Serial Number into a buffer that is only 64 bytes in size on the stack. Subsequently, sscanf attempts to parse this data into the buffer, leading to a classic stack buffer overflow (CWE-121). This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code with the privileges of the rc binary, which is part of the router's firmware. Exploitation requires physical access or control over a USB device connected to the router, as remote exploitation is not indicated. The CVSS v3.1 score is 6.8 (medium severity), reflecting the need for physical access (Attack Vector: Physical) but low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution could allow attackers to compromise the router, intercept or manipulate network traffic, or disrupt network services. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved on 2025-09-26 and published on 2025-11-13.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where physical security of network devices is not strictly enforced, such as public or semi-public areas, shared office spaces, or locations with frequent visitor access. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, manipulate network traffic, or launch further attacks within the internal network. Critical infrastructure operators, government agencies, and enterprises relying on D-Link DIR-878A1 routers could face operational disruptions and data breaches. The requirement for physical access limits the threat scope but does not eliminate it, especially in scenarios involving insider threats or social engineering to gain device proximity. The high impact on confidentiality, integrity, and availability underscores the importance of addressing this vulnerability promptly to maintain network security and trust.
Mitigation Recommendations
1. Enforce strict physical security controls around network infrastructure to prevent unauthorized access to routers and USB ports. 2. Disable or restrict USB port functionality on routers where possible, or use port locks to prevent unauthorized USB device insertion. 3. Monitor and log USB device connections to network devices to detect anomalous activity. 4. Segregate network devices physically and logically to limit exposure if a device is compromised. 5. Regularly check for and apply firmware updates from D-Link addressing this vulnerability once available. 6. Implement network segmentation and intrusion detection systems to detect unusual traffic patterns indicative of router compromise. 7. Educate staff about the risks of connecting unauthorized USB devices to network equipment. 8. Consider replacing affected routers with models that have no known vulnerabilities or better security controls if patching is delayed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-60674: n/a
Description
A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-60674 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin, specifically within the rc binary's USB storage handling module. The vulnerability stems from unsafe parsing of the "Serial Number" field of a USB device. The code uses fgets to read up to 127 bytes from the USB device's Serial Number into a buffer that is only 64 bytes in size on the stack. Subsequently, sscanf attempts to parse this data into the buffer, leading to a classic stack buffer overflow (CWE-121). This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code with the privileges of the rc binary, which is part of the router's firmware. Exploitation requires physical access or control over a USB device connected to the router, as remote exploitation is not indicated. The CVSS v3.1 score is 6.8 (medium severity), reflecting the need for physical access (Attack Vector: Physical) but low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution could allow attackers to compromise the router, intercept or manipulate network traffic, or disrupt network services. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved on 2025-09-26 and published on 2025-11-13.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where physical security of network devices is not strictly enforced, such as public or semi-public areas, shared office spaces, or locations with frequent visitor access. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, manipulate network traffic, or launch further attacks within the internal network. Critical infrastructure operators, government agencies, and enterprises relying on D-Link DIR-878A1 routers could face operational disruptions and data breaches. The requirement for physical access limits the threat scope but does not eliminate it, especially in scenarios involving insider threats or social engineering to gain device proximity. The high impact on confidentiality, integrity, and availability underscores the importance of addressing this vulnerability promptly to maintain network security and trust.
Mitigation Recommendations
1. Enforce strict physical security controls around network infrastructure to prevent unauthorized access to routers and USB ports. 2. Disable or restrict USB port functionality on routers where possible, or use port locks to prevent unauthorized USB device insertion. 3. Monitor and log USB device connections to network devices to detect anomalous activity. 4. Segregate network devices physically and logically to limit exposure if a device is compromised. 5. Regularly check for and apply firmware updates from D-Link addressing this vulnerability once available. 6. Implement network segmentation and intrusion detection systems to detect unusual traffic patterns indicative of router compromise. 7. Educate staff about the risks of connecting unauthorized USB devices to network equipment. 8. Consider replacing affected routers with models that have no known vulnerabilities or better security controls if patching is delayed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69162b1819431ce75c569440
Added to database: 11/13/2025, 7:01:44 PM
Last enriched: 11/20/2025, 7:38:34 PM
Last updated: 1/7/2026, 4:48:23 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.