CVE-2025-65007: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-65007 is a critical vulnerability identified in the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The root cause is a missing authentication mechanism in the configuration change module accessible via the adm.cgi endpoint. This flaw allows an unauthenticated attacker to perform sensitive operations such as creating backups, restarting the device, and resetting it to factory defaults without any credentials or user interaction. The vulnerability was confirmed in firmware version WDR28081123OV1.01; however, other versions have not been tested and may also be vulnerable. The lack of authentication on such a critical function exposes the device to remote exploitation, potentially leading to denial of service or loss of device configuration integrity. The CVSS 4.0 vector indicates the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The vendor was notified but has not provided patches or detailed information on affected versions, leaving users exposed. No known exploits have been observed in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk. The vulnerability falls under CWE-306, which highlights missing authentication for critical functions, a common and dangerous security oversight in embedded devices and routers.
Potential Impact
For European organizations, especially those relying on WODESYS WD-R608U routers in industrial, manufacturing, or critical infrastructure environments, this vulnerability poses a severe risk. Attackers can remotely disrupt network operations by restarting devices or resetting configurations, leading to downtime and potential loss of control over network segments. Unauthorized backup creation could expose sensitive configuration data, risking confidentiality breaches. The absence of authentication means attackers do not need credentials or user interaction, increasing the likelihood of exploitation. This can lead to operational disruptions, financial losses, and reputational damage. Given the strategic importance of industrial control systems and network reliability in Europe, exploitation could affect supply chains and critical services. The lack of vendor patches exacerbates the risk, forcing organizations to rely on compensating controls. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within corporate or industrial networks.
Mitigation Recommendations
Until an official patch is released, European organizations should implement specific mitigations: 1) Restrict network access to the adm.cgi endpoint by applying strict firewall rules and network segmentation, ensuring only trusted management networks can reach the router's administrative interfaces. 2) Disable remote management features on the WD-R608U routers if not strictly necessary, especially from untrusted or external networks. 3) Monitor network traffic for unusual requests targeting adm.cgi or unexpected device restarts and factory resets. 4) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of this vulnerability. 5) Regularly back up router configurations manually and securely to recover quickly from forced resets. 6) Engage with WODESYS or authorized vendors to obtain firmware updates or guidance and verify if other firmware versions are affected. 7) Consider replacing vulnerable devices with models from vendors with active security support if mitigation is not feasible. 8) Educate network administrators about the vulnerability and signs of exploitation to ensure rapid incident response.
Affected Countries
Germany, Poland, France, Italy, United Kingdom, Netherlands
CVE-2025-65007: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U
Description
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-65007 is a critical vulnerability identified in the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The root cause is a missing authentication mechanism in the configuration change module accessible via the adm.cgi endpoint. This flaw allows an unauthenticated attacker to perform sensitive operations such as creating backups, restarting the device, and resetting it to factory defaults without any credentials or user interaction. The vulnerability was confirmed in firmware version WDR28081123OV1.01; however, other versions have not been tested and may also be vulnerable. The lack of authentication on such a critical function exposes the device to remote exploitation, potentially leading to denial of service or loss of device configuration integrity. The CVSS 4.0 vector indicates the attack requires adjacent network access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and results in high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H). The vendor was notified but has not provided patches or detailed information on affected versions, leaving users exposed. No known exploits have been observed in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk. The vulnerability falls under CWE-306, which highlights missing authentication for critical functions, a common and dangerous security oversight in embedded devices and routers.
Potential Impact
For European organizations, especially those relying on WODESYS WD-R608U routers in industrial, manufacturing, or critical infrastructure environments, this vulnerability poses a severe risk. Attackers can remotely disrupt network operations by restarting devices or resetting configurations, leading to downtime and potential loss of control over network segments. Unauthorized backup creation could expose sensitive configuration data, risking confidentiality breaches. The absence of authentication means attackers do not need credentials or user interaction, increasing the likelihood of exploitation. This can lead to operational disruptions, financial losses, and reputational damage. Given the strategic importance of industrial control systems and network reliability in Europe, exploitation could affect supply chains and critical services. The lack of vendor patches exacerbates the risk, forcing organizations to rely on compensating controls. Additionally, the vulnerability could be leveraged as a foothold for further network intrusion or lateral movement within corporate or industrial networks.
Mitigation Recommendations
Until an official patch is released, European organizations should implement specific mitigations: 1) Restrict network access to the adm.cgi endpoint by applying strict firewall rules and network segmentation, ensuring only trusted management networks can reach the router's administrative interfaces. 2) Disable remote management features on the WD-R608U routers if not strictly necessary, especially from untrusted or external networks. 3) Monitor network traffic for unusual requests targeting adm.cgi or unexpected device restarts and factory resets. 4) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of this vulnerability. 5) Regularly back up router configurations manually and securely to recover quickly from forced resets. 6) Engage with WODESYS or authorized vendors to obtain firmware updates or guidance and verify if other firmware versions are affected. 7) Consider replacing vulnerable devices with models from vendors with active security support if mitigation is not feasible. 8) Educate network administrators about the vulnerability and signs of exploitation to ensure rapid incident response.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-13T09:42:15.300Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69441d2f4eb3efac369421a6
Added to database: 12/18/2025, 3:26:39 PM
Last enriched: 12/25/2025, 4:31:24 PM
Last updated: 2/6/2026, 2:48:52 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.