Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60674: n/a

0
Medium
VulnerabilityCVE-2025-60674cvecve-2025-60674
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A stack buffer overflow vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin in the rc binary's USB storage handling module. The vulnerability occurs when the "Serial Number" field from a USB device is read via sscanf into a 64-byte stack buffer, while fgets reads up to 127 bytes, causing a stack overflow. An attacker with physical access or control over a USB device can exploit this vulnerability to potentially execute arbitrary code on the device.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:38:34 UTC

Technical Analysis

CVE-2025-60674 is a stack-based buffer overflow vulnerability identified in the D-Link DIR-878A1 router firmware version FW101B04.bin, specifically within the rc binary's USB storage handling module. The vulnerability stems from unsafe parsing of the "Serial Number" field of a USB device. The code uses fgets to read up to 127 bytes from the USB device's Serial Number into a buffer that is only 64 bytes in size on the stack. Subsequently, sscanf attempts to parse this data into the buffer, leading to a classic stack buffer overflow (CWE-121). This overflow can corrupt the stack, potentially allowing an attacker to execute arbitrary code with the privileges of the rc binary, which is part of the router's firmware. Exploitation requires physical access or control over a USB device connected to the router, as remote exploitation is not indicated. The CVSS v3.1 score is 6.8 (medium severity), reflecting the need for physical access (Attack Vector: Physical) but low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution could allow attackers to compromise the router, intercept or manipulate network traffic, or disrupt network services. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved on 2025-09-26 and published on 2025-11-13.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where physical security of network devices is not strictly enforced, such as public or semi-public areas, shared office spaces, or locations with frequent visitor access. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept sensitive communications, manipulate network traffic, or launch further attacks within the internal network. Critical infrastructure operators, government agencies, and enterprises relying on D-Link DIR-878A1 routers could face operational disruptions and data breaches. The requirement for physical access limits the threat scope but does not eliminate it, especially in scenarios involving insider threats or social engineering to gain device proximity. The high impact on confidentiality, integrity, and availability underscores the importance of addressing this vulnerability promptly to maintain network security and trust.

Mitigation Recommendations

1. Enforce strict physical security controls around network infrastructure to prevent unauthorized access to routers and USB ports. 2. Disable or restrict USB port functionality on routers where possible, or use port locks to prevent unauthorized USB device insertion. 3. Monitor and log USB device connections to network devices to detect anomalous activity. 4. Segregate network devices physically and logically to limit exposure if a device is compromised. 5. Regularly check for and apply firmware updates from D-Link addressing this vulnerability once available. 6. Implement network segmentation and intrusion detection systems to detect unusual traffic patterns indicative of router compromise. 7. Educate staff about the risks of connecting unauthorized USB devices to network equipment. 8. Consider replacing affected routers with models that have no known vulnerabilities or better security controls if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69162b1819431ce75c569440

Added to database: 11/13/2025, 7:01:44 PM

Last enriched: 11/20/2025, 7:38:34 PM

Last updated: 1/7/2026, 4:48:23 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats