Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65007: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U

0
High
VulnerabilityCVE-2025-65007cvecve-2025-65007cwe-306
Published: Thu Dec 18 2025 (12/18/2025, 15:10:22 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:42:27 UTC

Technical Analysis

CVE-2025-65007 identifies a critical security vulnerability in the WODESYS WD-R608U router series, specifically confirmed in firmware version WDR28081123OV1.01. The root cause is a missing authentication mechanism in the configuration change module accessible via the adm.cgi endpoint. This flaw allows an unauthenticated attacker to remotely execute sensitive commands without any user interaction or privileges. Commands that can be executed include creating device backups, restarting the router, and resetting it to factory defaults, which can lead to denial of service or loss of configuration integrity. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating that critical functions are exposed without proper access controls. The CVSS v4.0 score of 8.7 (high severity) reflects the ease of exploitation (attack vector: adjacent network), no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The vendor was notified early but has not disclosed detailed affected version ranges or provided patches, complicating mitigation efforts. No known exploits have been reported in the wild yet, but the vulnerability presents a significant risk to any organization using the affected devices. The lack of authentication on a management interface accessible over the network is a serious security oversight, potentially allowing attackers to disrupt network operations or gain persistent control over the device.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to network stability and security. Exploitation can lead to denial of service through device restarts or factory resets, causing operational downtime and potential loss of network connectivity. The ability to create backups without authentication may expose sensitive configuration data, risking confidentiality breaches. Critical infrastructure operators, enterprises, and service providers using WODESYS WD-R608U routers could face disruptions impacting business continuity and service availability. The absence of authentication also increases the risk of lateral movement within networks if attackers gain footholds via these devices. Given the router's role in network management, compromised devices could be leveraged for further attacks or espionage. The lack of vendor patches exacerbates the threat, forcing organizations to rely on network-level mitigations or device replacement. The vulnerability's high severity and ease of exploitation make it a priority concern for cybersecurity teams in Europe, especially in sectors with stringent regulatory requirements for network security and uptime.

Mitigation Recommendations

1. Immediately restrict access to the adm.cgi management interface by implementing strict network segmentation and firewall rules, allowing only trusted administrative hosts to connect. 2. Disable remote management features on the WD-R608U routers if not strictly necessary, or restrict them to secure VPN connections. 3. Monitor network traffic for unusual requests targeting the adm.cgi endpoint, and set up alerts for suspicious activities such as repeated unauthenticated commands. 4. Conduct an inventory to identify all deployed WODESYS WD-R608U routers and verify firmware versions; prioritize remediation for confirmed vulnerable devices. 5. Engage with the vendor for updates or patches and subscribe to security advisories for any forthcoming fixes. 6. Where possible, replace vulnerable devices with alternative routers that have robust authentication and security controls. 7. Implement multi-factor authentication and strong password policies on all network devices to reduce the risk of exploitation through other vectors. 8. Regularly back up device configurations securely to enable rapid recovery if a device is compromised or reset. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Educate network administrators about the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421a6

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/18/2025, 3:42:27 PM

Last updated: 12/19/2025, 10:22:45 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats