Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65010: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U

0
High
VulnerabilityCVE-2025-65010cvecve-2025-65010cwe-306
Published: Thu Dec 18 2025 (12/18/2025, 15:10:34 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/25/2025, 16:32:03 UTC

Technical Analysis

CVE-2025-65010 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The issue resides in the initial configuration wizard.cgi endpoint, which lacks proper authentication controls. This allows an unauthenticated attacker with network access to change the administrator password arbitrarily, effectively gaining administrative control over the device. The vulnerability is present not only during the initial setup phase but also persists after the router has been configured, increasing the attack surface. The only confirmed vulnerable firmware version is WDR28081123OV1.01; however, the vendor has not disclosed whether other versions are affected, and no patches have been released. The CVSS v4.0 score is 7.1 (high severity), reflecting the ease of exploitation (no privileges or user interaction required) and the significant impact on device integrity and confidentiality. The vulnerability does not require physical access but does require network access to the device, which could be local or remote depending on network exposure. Exploitation could allow attackers to lock out legitimate administrators, manipulate router settings, intercept or redirect traffic, and potentially pivot into internal networks. No known exploits are publicly available yet, but the lack of vendor response and patch availability increases risk. This vulnerability highlights the critical need for secure authentication mechanisms on network infrastructure devices, especially those exposed to untrusted networks.

Potential Impact

For European organizations, exploitation of CVE-2025-65010 could lead to complete compromise of affected routers, resulting in unauthorized administrative access. This can cause severe confidentiality breaches through interception or manipulation of network traffic, integrity violations by altering router configurations, and availability disruptions if attackers lock out legitimate users or disable network services. Organizations relying on WODESYS WD-R608U routers for critical network infrastructure, including SMEs and industrial environments, face risks of lateral movement by attackers into internal systems. Given the router's role as a gateway device, compromise could undermine perimeter defenses and expose sensitive data or operational technology. The absence of patches and vendor communication exacerbates the threat, especially in sectors with stringent data protection requirements such as finance, healthcare, and government. Additionally, the vulnerability could be exploited in supply chain attacks or targeted espionage campaigns against European entities. The potential for remote exploitation without authentication increases the urgency for mitigation in environments where these devices are accessible from untrusted networks.

Mitigation Recommendations

European organizations using WODESYS WD-R608U routers should immediately audit their network to identify devices running the confirmed vulnerable firmware version WDR28081123OV1.01 or related models. Until a vendor patch is available, mitigate risk by restricting network access to the router's management interfaces using firewall rules or network segmentation, ensuring that only trusted administrative hosts can reach the configuration endpoints. Disable remote management features if enabled, or restrict them to secure VPN connections. Implement strong network monitoring and alerting for unusual configuration changes or access attempts to the router. Consider deploying network intrusion detection systems (NIDS) to detect exploitation attempts targeting the wizard.cgi endpoint. Where possible, replace vulnerable devices with alternatives from vendors with active security support. Maintain an inventory of all network devices and enforce strict configuration management policies. Engage with WODESYS for updates and monitor security advisories for patches or additional guidance. Finally, educate network administrators about this vulnerability and the importance of securing router management interfaces.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421b5

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/25/2025, 4:32:03 PM

Last updated: 2/6/2026, 1:20:06 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats