Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65009: CWE-256 Plaintext Storage of a Password in WODESYS WD-R608U

0
High
VulnerabilityCVE-2025-65009cvecve-2025-65009cwe-256
Published: Thu Dec 18 2025 (12/18/2025, 15:10:31 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) admin password is stored in configuration file as plaintext and can be obtained by unauthorized user by direct references to the resource in question. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:41:57 UTC

Technical Analysis

The CVE-2025-65009 vulnerability affects the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The core issue is the storage of the administrative password in plaintext within the router's configuration file, which can be accessed by unauthorized users through direct references to the resource containing this file. This vulnerability was confirmed in firmware version WDR28081123OV1.01; however, other versions have not been tested and may also be vulnerable. The vulnerability is categorized under CWE-256, indicating improper storage of sensitive information. The CVSS 4.0 base score is 7.1, with an attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. This means an attacker within the same or adjacent network segment can easily exploit the vulnerability without authentication or user interaction to obtain the admin password in plaintext. Once the password is obtained, the attacker can gain full administrative access to the router, potentially leading to network traffic interception, configuration manipulation, or pivoting to other internal systems. The vendor was notified early but has not provided detailed information or patches, and no known exploits are currently reported in the wild. The lack of patch links suggests mitigation options are limited to configuration changes or device replacement. The vulnerability poses a significant risk to organizations relying on these routers, especially where network segmentation is weak or remote access is enabled.

Potential Impact

For European organizations, this vulnerability presents a critical risk to network security and confidentiality. Unauthorized access to the router's administrative credentials can lead to full device compromise, allowing attackers to intercept, modify, or redirect network traffic, potentially exposing sensitive data or disrupting communications. In sectors such as finance, healthcare, government, and critical infrastructure, this could result in data breaches, operational disruptions, or espionage. The ease of exploitation without authentication or user interaction increases the likelihood of successful attacks, especially in environments where network access controls are insufficient. Additionally, since the vulnerability affects router firmware, it can impact a broad range of connected devices and users within an organization. The absence of vendor patches exacerbates the risk, forcing organizations to rely on compensating controls or hardware replacement. The potential for lateral movement within networks following compromise further amplifies the threat to European enterprises and public sector entities.

Mitigation Recommendations

1. Immediately restrict access to router configuration files by implementing strict network segmentation and access control lists (ACLs) to limit who can reach the device management interfaces and configuration resources. 2. Disable remote management features unless absolutely necessary, and if enabled, restrict access to trusted IP addresses only. 3. Monitor network traffic for unusual access patterns or attempts to retrieve configuration files. 4. Where possible, upgrade to newer firmware versions if the vendor releases patches addressing this vulnerability; maintain close communication with the vendor for updates. 5. If patches are unavailable, consider replacing affected devices with models that follow secure password storage practices. 6. Implement multi-factor authentication (MFA) on router management interfaces if supported to add an additional layer of security. 7. Conduct regular audits of device configurations and password storage methods to detect similar issues proactively. 8. Educate network administrators about the risks of plaintext password storage and enforce policies for secure credential management. 9. Employ network intrusion detection systems (NIDS) to detect exploitation attempts targeting this vulnerability. 10. Maintain an inventory of all WODESYS devices in use to prioritize mitigation efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421b0

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/18/2025, 3:41:57 PM

Last updated: 12/19/2025, 10:06:36 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats