CVE-2025-65010: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U
WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-65010 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the WODESYS WD-R608U router family, specifically confirmed in version WDR28081123OV1.01. The flaw resides in the initial configuration wizard.cgi endpoint, which lacks proper authentication checks, allowing an unauthenticated attacker on the adjacent network to change the administrator password without authorization. This broken access control issue persists beyond the initial setup phase, meaning the device remains vulnerable even after configuration is complete. The vulnerability's CVSS 4.0 score is 7.1 (high), reflecting its significant impact and relatively low attack complexity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via a bridged network segment. No privileges or user interaction are required, and the vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling unauthorized administrative access. The vendor has been notified but has not provided detailed information or patches, and only one firmware version has been tested. This vulnerability could allow attackers to take full control of the router, potentially intercepting, redirecting, or disrupting network traffic, and facilitating further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the critical role routers play in network security and traffic management. Unauthorized password changes can lead to complete administrative takeover, enabling attackers to manipulate network configurations, intercept sensitive data, or launch further attacks such as lateral movement or persistent network compromise. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators relying on WODESYS routers. The lack of authentication on a critical function undermines trust in network perimeter defenses and could lead to data breaches, service disruptions, and compliance violations under regulations like GDPR. The adjacent network attack vector means that internal threat actors or attackers who gain local network access (e.g., via Wi-Fi or compromised devices) can exploit this vulnerability, increasing the attack surface within organizational environments.
Mitigation Recommendations
Organizations should immediately identify any WODESYS WD-R608U routers in their infrastructure, especially those running firmware version WDR28081123OV1.01. Since no official patches are available, mitigation should include isolating affected devices on segmented networks with strict access controls to limit exposure to untrusted users. Network administrators should disable remote management interfaces if enabled and restrict management access to trusted IP addresses only. Monitoring network traffic for unusual configuration changes or unauthorized access attempts is critical. Where possible, replace vulnerable devices with updated or alternative hardware from vendors with active security support. Additionally, implement network-level protections such as VLAN segmentation, strong Wi-Fi security, and endpoint security to reduce the risk of an attacker gaining adjacent network access. Regularly audit router configurations and credentials to detect unauthorized changes promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2025-65010: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U
Description
WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-65010 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the WODESYS WD-R608U router family, specifically confirmed in version WDR28081123OV1.01. The flaw resides in the initial configuration wizard.cgi endpoint, which lacks proper authentication checks, allowing an unauthenticated attacker on the adjacent network to change the administrator password without authorization. This broken access control issue persists beyond the initial setup phase, meaning the device remains vulnerable even after configuration is complete. The vulnerability's CVSS 4.0 score is 7.1 (high), reflecting its significant impact and relatively low attack complexity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via a bridged network segment. No privileges or user interaction are required, and the vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling unauthorized administrative access. The vendor has been notified but has not provided detailed information or patches, and only one firmware version has been tested. This vulnerability could allow attackers to take full control of the router, potentially intercepting, redirecting, or disrupting network traffic, and facilitating further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the critical role routers play in network security and traffic management. Unauthorized password changes can lead to complete administrative takeover, enabling attackers to manipulate network configurations, intercept sensitive data, or launch further attacks such as lateral movement or persistent network compromise. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators relying on WODESYS routers. The lack of authentication on a critical function undermines trust in network perimeter defenses and could lead to data breaches, service disruptions, and compliance violations under regulations like GDPR. The adjacent network attack vector means that internal threat actors or attackers who gain local network access (e.g., via Wi-Fi or compromised devices) can exploit this vulnerability, increasing the attack surface within organizational environments.
Mitigation Recommendations
Organizations should immediately identify any WODESYS WD-R608U routers in their infrastructure, especially those running firmware version WDR28081123OV1.01. Since no official patches are available, mitigation should include isolating affected devices on segmented networks with strict access controls to limit exposure to untrusted users. Network administrators should disable remote management interfaces if enabled and restrict management access to trusted IP addresses only. Monitoring network traffic for unusual configuration changes or unauthorized access attempts is critical. Where possible, replace vulnerable devices with updated or alternative hardware from vendors with active security support. Additionally, implement network-level protections such as VLAN segmentation, strong Wi-Fi security, and endpoint security to reduce the risk of an attacker gaining adjacent network access. Regularly audit router configurations and credentials to detect unauthorized changes promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-13T09:42:15.302Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69441d2f4eb3efac369421b5
Added to database: 12/18/2025, 3:26:39 PM
Last enriched: 12/18/2025, 3:41:37 PM
Last updated: 12/19/2025, 4:00:06 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67846: CWE-472 External Control of Assumed-Immutable Web Parameter in Mintlify Mintlify Platform
MediumCVE-2025-67845: CWE-24 Path Traversal: '../filedir' in Mintlify Mintlify Platform
MediumCVE-2025-67844: CWE-425 Direct Request ('Forced Browsing') in Mintlify Mintlify Platform
MediumCVE-2025-67843: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in Mintlify Mintlify Platform
HighCVE-2025-67842: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in Mintlify Mintlify Platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.