Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60772: n/a

0
Unknown
VulnerabilityCVE-2025-60772cvecve-2025-60772
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Improper authentication in the web-based management interface of NETLINK HG322G V1.0.00-231017, allows a remote unauthenticated attacker to escalate privileges and lock out the legitimate administrator via crafted HTTP requests.

AI-Powered Analysis

AILast updated: 10/21/2025, 17:25:05 UTC

Technical Analysis

CVE-2025-60772 is an authentication bypass vulnerability found in the web-based management interface of the NETLINK HG322G router firmware version V1.0.00-231017. The flaw allows a remote, unauthenticated attacker to send specially crafted HTTP requests that bypass the normal authentication mechanisms. This enables the attacker to escalate privileges to administrative levels and subsequently lock out the legitimate administrator from accessing the device. The vulnerability arises due to improper validation of authentication tokens or session management flaws in the router's web interface. Exploitation does not require any prior credentials or user interaction, making it highly accessible to remote attackers scanning for vulnerable devices. Although no public exploits have been reported yet, the potential for denial of service through administrative lockout and unauthorized control over the device configuration is significant. The affected device is typically deployed in small to medium enterprise or residential environments, where network routers serve as critical gateways. The absence of a CVSS score indicates that the vulnerability is newly published and pending further analysis. However, the technical details suggest a high severity due to the ease of exploitation and impact on device availability and administrative integrity.

Potential Impact

For European organizations, this vulnerability could lead to severe operational disruptions. Attackers gaining administrative access can alter network configurations, disable security features, or lock out legitimate administrators, effectively causing denial of service. This could compromise the confidentiality, integrity, and availability of internal networks, especially if the affected routers serve as primary gateways or VPN endpoints. Small and medium enterprises relying on NETLINK HG322G devices may experience prolonged outages or unauthorized network access. The impact extends to residential users who might be part of larger corporate or governmental networks, potentially serving as entry points for broader attacks. The lack of authentication requirement and remote exploitability increases the attack surface, making it easier for threat actors to target multiple devices across Europe. Additionally, the administrative lockout could delay incident response and remediation efforts, exacerbating the impact.

Mitigation Recommendations

Immediate mitigation should focus on isolating the affected NETLINK HG322G devices from untrusted networks, especially restricting remote access to the web management interface via firewall rules or network segmentation. Organizations should monitor network traffic for unusual HTTP requests targeting the router's management interface. Since no official patch or firmware update is currently available, contacting the vendor for guidance and updates is critical. Implementing multi-factor authentication (MFA) for device management where possible can add an additional security layer. Network administrators should maintain backups of router configurations to facilitate recovery in case of lockout. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures for suspicious HTTP requests can help detect exploitation attempts. Finally, organizations should consider replacing vulnerable devices with models that have robust security controls and timely patch support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7be6441ea2e78b8952f3b

Added to database: 10/21/2025, 5:09:56 PM

Last enriched: 10/21/2025, 5:25:05 PM

Last updated: 10/21/2025, 8:00:36 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats