Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65008: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WODESYS WD-R608U

0
Critical
VulnerabilityCVE-2025-65008cvecve-2025-65008cwe-78
Published: Thu Dec 18 2025 (12/18/2025, 15:10:27 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of validation in the langGet parameter in the adm.cgi endpoint, the malicious attacker can execute system shell commands. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:42:12 UTC

Technical Analysis

CVE-2025-65008 is an OS command injection vulnerability classified under CWE-78 affecting the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The vulnerability stems from inadequate input validation of the 'langGet' parameter in the adm.cgi web management interface. This flaw allows an unauthenticated remote attacker to inject and execute arbitrary shell commands on the underlying operating system. The vulnerability was confirmed in firmware version WDR28081123OV1.01; however, other versions have not been tested and may also be vulnerable. The attack vector requires only network access to the router's management interface, with no authentication or user interaction needed, making exploitation straightforward. The CVSS 4.0 base score of 9.4 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. The vendor has been notified but has not provided detailed information or patches. No public exploits have been observed yet, but the severity and ease of exploitation make this a significant threat. The vulnerability could allow attackers to gain full control over the device, manipulate network traffic, intercept sensitive data, or use the router as a pivot point for further attacks within an organization’s network.

Potential Impact

For European organizations, exploitation of CVE-2025-65008 could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive communications, and disruption of network services. Given that routers are critical network infrastructure components, compromise could result in widespread operational outages and data breaches. Industrial, governmental, and enterprise sectors relying on WODESYS routers for connectivity or control systems are particularly vulnerable. The ability to execute arbitrary commands without authentication increases the risk of rapid and stealthy compromise. Additionally, attackers could deploy persistent backdoors or malware, facilitating long-term espionage or sabotage. The lack of available patches exacerbates the risk, necessitating immediate defensive actions. The threat also extends to supply chain security if these routers are used in managed service provider environments or critical infrastructure networks across Europe.

Mitigation Recommendations

1. Immediately isolate affected WODESYS WD-R608U devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Restrict access to the adm.cgi management interface using network segmentation, firewall rules, or VPNs limited to trusted administrators. 3. Implement strict ingress filtering and monitor network traffic for unusual requests targeting the 'langGet' parameter or adm.cgi endpoint. 4. Conduct thorough inventory and version verification of all WODESYS routers in use to identify potentially vulnerable devices. 5. Engage with WODESYS vendor support channels for updates or patches, and subscribe to security advisories for timely information. 6. Consider deploying host-based or network-based intrusion detection systems (IDS) with signatures or heuristics for OS command injection attempts. 7. If possible, replace vulnerable devices with alternative hardware or firmware versions confirmed to be secure. 8. Establish incident response plans specifically addressing router compromise scenarios, including forensic data collection and recovery procedures. 9. Educate network administrators on the risks and signs of exploitation related to this vulnerability. 10. Regularly back up router configurations and critical network data to enable rapid restoration after an incident.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.301Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421ab

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/18/2025, 3:42:12 PM

Last updated: 12/19/2025, 11:42:00 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats