Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65010: CWE-306 Missing Authentication for Critical Function in WODESYS WD-R608U

0
High
VulnerabilityCVE-2025-65010cvecve-2025-65010cwe-306
Published: Thu Dec 18 2025 (12/18/2025, 15:10:34 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:41:37 UTC

Technical Analysis

CVE-2025-65010 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in the WODESYS WD-R608U router family, specifically confirmed in version WDR28081123OV1.01. The flaw resides in the initial configuration wizard.cgi endpoint, which lacks proper authentication checks, allowing an unauthenticated attacker on the adjacent network to change the administrator password without authorization. This broken access control issue persists beyond the initial setup phase, meaning the device remains vulnerable even after configuration is complete. The vulnerability's CVSS 4.0 score is 7.1 (high), reflecting its significant impact and relatively low attack complexity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via a bridged network segment. No privileges or user interaction are required, and the vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling unauthorized administrative access. The vendor has been notified but has not provided detailed information or patches, and only one firmware version has been tested. This vulnerability could allow attackers to take full control of the router, potentially intercepting, redirecting, or disrupting network traffic, and facilitating further attacks within the network.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the critical role routers play in network security and traffic management. Unauthorized password changes can lead to complete administrative takeover, enabling attackers to manipulate network configurations, intercept sensitive data, or launch further attacks such as lateral movement or persistent network compromise. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators relying on WODESYS routers. The lack of authentication on a critical function undermines trust in network perimeter defenses and could lead to data breaches, service disruptions, and compliance violations under regulations like GDPR. The adjacent network attack vector means that internal threat actors or attackers who gain local network access (e.g., via Wi-Fi or compromised devices) can exploit this vulnerability, increasing the attack surface within organizational environments.

Mitigation Recommendations

Organizations should immediately identify any WODESYS WD-R608U routers in their infrastructure, especially those running firmware version WDR28081123OV1.01. Since no official patches are available, mitigation should include isolating affected devices on segmented networks with strict access controls to limit exposure to untrusted users. Network administrators should disable remote management interfaces if enabled and restrict management access to trusted IP addresses only. Monitoring network traffic for unusual configuration changes or unauthorized access attempts is critical. Where possible, replace vulnerable devices with updated or alternative hardware from vendors with active security support. Additionally, implement network-level protections such as VLAN segmentation, strong Wi-Fi security, and endpoint security to reduce the risk of an attacker gaining adjacent network access. Regularly audit router configurations and credentials to detect unauthorized changes promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421b5

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/18/2025, 3:41:37 PM

Last updated: 12/19/2025, 4:00:06 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats