Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65011: CWE-425 Direct Request ('Forced Browsing') in WODESYS WD-R608U

0
High
VulnerabilityCVE-2025-65011cvecve-2025-65011cwe-425
Published: Thu Dec 18 2025 (12/18/2025, 15:10:35 UTC)
Source: CVE Database V5
Vendor/Project: WODESYS
Product: WD-R608U

Description

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) an unauthorised user can view configuration files by directly referencing the resource in question. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:41:21 UTC

Technical Analysis

CVE-2025-65011 identifies a direct request vulnerability (CWE-425) in the WODESYS WD-R608U router series, including models WDR122B V2.0 and WDR28. This vulnerability allows an unauthenticated attacker to bypass access controls by directly referencing configuration file resources via crafted HTTP requests. The vulnerability was confirmed in firmware version WDR28081123OV1.01, with no information on other versions, leaving the possibility of broader exposure. The attack vector requires network-level access (AV:A), but no privileges, authentication, or user interaction are necessary, making exploitation relatively straightforward for an attacker with network access. The vulnerability severely compromises confidentiality (VC:H) by exposing sensitive configuration files, which may contain credentials, network topology, or other critical information. Integrity and availability are not directly impacted. The vendor was notified but has not provided detailed information or patches, and no known exploits have been observed in the wild. The lack of patch availability increases the urgency for defensive measures. The vulnerability's CVSS 4.0 score of 7.1 reflects its high severity, primarily due to the ease of exploitation and the sensitive nature of the exposed data. This vulnerability poses a significant risk to organizations relying on these routers for network management, especially in environments where network segmentation is weak or remote access is enabled.

Potential Impact

For European organizations, this vulnerability presents a significant risk to network security and confidentiality. Exposure of configuration files can lead to disclosure of sensitive information such as administrative credentials, network configurations, and security settings, enabling attackers to escalate privileges, pivot within networks, or launch further attacks. Critical infrastructure, enterprises, and service providers using the affected WODESYS routers may face increased risk of targeted attacks or espionage. The lack of authentication requirement and ease of exploitation mean that attackers with network access—potentially even from internal networks or compromised devices—can leverage this vulnerability. This could result in data breaches, operational disruptions, or compromise of connected systems. The absence of patches and public exploit code means organizations must rely on network-level mitigations and monitoring until vendor fixes are released. Given the router's role in network management, the impact on availability is limited but the confidentiality breach can have cascading effects on overall security posture.

Mitigation Recommendations

1. Immediately restrict access to the router's management interfaces by implementing strict network segmentation and firewall rules, allowing only trusted IP addresses or management stations to connect. 2. Disable remote management features if not required, or restrict them to secure VPN connections with strong authentication. 3. Monitor network traffic for unusual HTTP requests targeting configuration files or unauthorized access attempts to the router's web interface. 4. Conduct thorough audits of router configurations and credentials to identify any exposure or compromise. 5. Engage with WODESYS support to obtain information on patches or firmware updates addressing this vulnerability and apply them promptly once available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect forced browsing attempts. 7. Educate network administrators about the vulnerability and enforce strong operational security practices around router management. 8. If possible, replace affected devices with models from vendors with timely security support and patching history.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-13T09:42:15.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69441d2f4eb3efac369421ba

Added to database: 12/18/2025, 3:26:39 PM

Last enriched: 12/18/2025, 3:41:21 PM

Last updated: 12/19/2025, 6:14:17 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats