Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60675: n/a

0
Medium
VulnerabilityCVE-2025-60675cvecve-2025-60675
Published: Thu Nov 13 2025 (11/13/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

AI-Powered Analysis

AILast updated: 11/20/2025, 19:37:21 UTC

Technical Analysis

CVE-2025-60675 is a command injection vulnerability identified in the D-Link DIR-823G router firmware version DIR823G_V1.0.2B05_20181207.bin. The flaw exists in the timelycheck and sysconf binaries, which handle the /tmp/new_qos.rule configuration file. These binaries parse fields from this file and directly concatenate them into command strings executed via the system() function call without any input sanitization or validation. This unsafe coding practice corresponds to CWE-77 (Improper Neutralization of Special Elements used in a Command). An attacker who can write to /tmp/new_qos.rule can inject arbitrary shell commands, leading to command execution with the privileges of the affected binaries. The vulnerability requires the attacker to have local write access to the /tmp directory on the device, which typically implies some level of authenticated access or prior compromise. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges (PR:L), no user interaction, and limited impact on confidentiality and integrity but no impact on availability. No patches or known exploits are currently available, but the vulnerability poses a risk of unauthorized command execution, potentially allowing attackers to manipulate router configurations, intercept or redirect traffic, or establish persistent footholds.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized command execution on affected D-Link DIR-823G routers, compromising the confidentiality and integrity of network traffic and configurations. Attackers with local access could manipulate QoS rules or other router settings, potentially enabling traffic interception, data exfiltration, or lateral movement within internal networks. Although availability is not directly impacted, the integrity breach could disrupt normal network operations or facilitate further attacks. Organizations with less stringent physical or administrative controls over network devices are at higher risk. The medium severity score suggests moderate risk, but the impact could escalate if combined with other vulnerabilities or if attackers gain initial access through weak credentials or other means. Given the widespread use of D-Link routers in small and medium enterprises and home offices across Europe, this vulnerability could affect a broad user base, especially in sectors with less mature network security practices.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately restrict write permissions to the /tmp/new_qos.rule file and the /tmp directory on affected devices, ensuring only trusted system processes can modify these files. Network segmentation and strict access controls should limit who can access router management interfaces and underlying file systems. Monitoring and alerting for unauthorized changes to configuration files in /tmp can help detect exploitation attempts. Organizations should enforce strong authentication mechanisms on routers to prevent unauthorized local access. Until an official firmware patch is released, consider isolating affected routers from critical network segments or replacing them with devices from vendors with timely security updates. Additionally, conducting regular firmware audits and vulnerability assessments on network devices will help identify and remediate similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6916279419431ce75c50bd7e

Added to database: 11/13/2025, 6:46:44 PM

Last enriched: 11/20/2025, 7:37:21 PM

Last updated: 12/29/2025, 8:18:05 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats