CVE-2025-65011: CWE-425 Direct Request ('Forced Browsing') in WODESYS WD-R608U
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) an unauthorised user can view configuration files by directly referencing the resource in question. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-65011 is a vulnerability classified under CWE-425 (Direct Request or Forced Browsing) affecting the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The vulnerability allows an unauthenticated attacker to directly request and access configuration files by referencing their URLs or resource paths without proper authorization checks. This type of vulnerability arises when web applications or embedded device management interfaces fail to enforce access control on sensitive resources, enabling attackers to bypass authentication mechanisms. The vendor was notified early but did not provide detailed information about the affected version range; only firmware version WDR28081123OV1.01 has been tested and confirmed vulnerable. The CVSS 4.0 base score is 7.1 (high severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H), with no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit by an attacker with network access to the device's management interface. No patches or mitigations have been officially released, and no known exploits have been observed in the wild. The vulnerability poses a significant risk as configuration files often contain sensitive information such as credentials, network settings, or cryptographic keys, which can be leveraged for further attacks or lateral movement within a network.
Potential Impact
For European organizations, especially those in industrial, manufacturing, or critical infrastructure sectors that deploy WODESYS WD-R608U routers, this vulnerability presents a serious confidentiality risk. Unauthorized access to configuration files can lead to exposure of sensitive credentials, network topology, and device settings, enabling attackers to compromise network security, conduct further intrusions, or disrupt operations. Given the router's use in industrial environments, exploitation could facilitate espionage, sabotage, or unauthorized control of operational technology systems. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks if devices are accessible from internal or adjacent networks. The absence of vendor patches exacerbates the risk, forcing organizations to rely on compensating controls. The impact is particularly critical for organizations subject to strict data protection regulations such as GDPR, as exposure of sensitive information could lead to compliance violations and reputational damage.
Mitigation Recommendations
1. Immediately restrict network access to the management interface of WODESYS WD-R608U routers by implementing strict firewall rules and network segmentation to limit access only to trusted administrators and systems. 2. Disable remote management features if not required, or enforce VPN access with strong authentication for remote connections. 3. Monitor network traffic for unusual or unauthorized direct requests targeting router configuration files or management URLs. 4. Conduct an inventory of all WODESYS WD-R608U devices and verify firmware versions; prioritize isolating or upgrading devices running the vulnerable version WDR28081123OV1.01. 5. Engage with the vendor for firmware updates or patches and apply them promptly once available. 6. Implement additional authentication layers or web application firewalls (WAF) in front of device management interfaces to detect and block forced browsing attempts. 7. Regularly audit device configurations and logs to detect potential unauthorized access or exploitation attempts. 8. Educate network and security teams about this vulnerability and the importance of securing device management interfaces.
Affected Countries
Poland, Germany, France, Italy, Spain, United Kingdom
CVE-2025-65011: CWE-425 Direct Request ('Forced Browsing') in WODESYS WD-R608U
Description
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) an unauthorised user can view configuration files by directly referencing the resource in question. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-65011 is a vulnerability classified under CWE-425 (Direct Request or Forced Browsing) affecting the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. The vulnerability allows an unauthenticated attacker to directly request and access configuration files by referencing their URLs or resource paths without proper authorization checks. This type of vulnerability arises when web applications or embedded device management interfaces fail to enforce access control on sensitive resources, enabling attackers to bypass authentication mechanisms. The vendor was notified early but did not provide detailed information about the affected version range; only firmware version WDR28081123OV1.01 has been tested and confirmed vulnerable. The CVSS 4.0 base score is 7.1 (high severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H), with no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit by an attacker with network access to the device's management interface. No patches or mitigations have been officially released, and no known exploits have been observed in the wild. The vulnerability poses a significant risk as configuration files often contain sensitive information such as credentials, network settings, or cryptographic keys, which can be leveraged for further attacks or lateral movement within a network.
Potential Impact
For European organizations, especially those in industrial, manufacturing, or critical infrastructure sectors that deploy WODESYS WD-R608U routers, this vulnerability presents a serious confidentiality risk. Unauthorized access to configuration files can lead to exposure of sensitive credentials, network topology, and device settings, enabling attackers to compromise network security, conduct further intrusions, or disrupt operations. Given the router's use in industrial environments, exploitation could facilitate espionage, sabotage, or unauthorized control of operational technology systems. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks if devices are accessible from internal or adjacent networks. The absence of vendor patches exacerbates the risk, forcing organizations to rely on compensating controls. The impact is particularly critical for organizations subject to strict data protection regulations such as GDPR, as exposure of sensitive information could lead to compliance violations and reputational damage.
Mitigation Recommendations
1. Immediately restrict network access to the management interface of WODESYS WD-R608U routers by implementing strict firewall rules and network segmentation to limit access only to trusted administrators and systems. 2. Disable remote management features if not required, or enforce VPN access with strong authentication for remote connections. 3. Monitor network traffic for unusual or unauthorized direct requests targeting router configuration files or management URLs. 4. Conduct an inventory of all WODESYS WD-R608U devices and verify firmware versions; prioritize isolating or upgrading devices running the vulnerable version WDR28081123OV1.01. 5. Engage with the vendor for firmware updates or patches and apply them promptly once available. 6. Implement additional authentication layers or web application firewalls (WAF) in front of device management interfaces to detect and block forced browsing attempts. 7. Regularly audit device configurations and logs to detect potential unauthorized access or exploitation attempts. 8. Educate network and security teams about this vulnerability and the importance of securing device management interfaces.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-11-13T09:42:15.302Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69441d2f4eb3efac369421ba
Added to database: 12/18/2025, 3:26:39 PM
Last enriched: 12/25/2025, 4:32:22 PM
Last updated: 2/6/2026, 12:01:45 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumCVE-2026-2015: Improper Authorization in Portabilis i-Educar
MediumCVE-2026-2014: SQL Injection in itsourcecode Student Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.