Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65128: n/a

0
High
VulnerabilityCVE-2025-65128cvecve-2025-65128
Published: Wed Feb 11 2026 (02/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65128 is a vulnerability in the web management API of Shenzhen Zhibotong Electronics ZBT WE2001 routers that lacks authentication controls. This flaw allows unauthenticated attackers on the local network to modify critical router configurations by invoking API operations ending with "*_nocommit" and supplying expected parameters. Attackers can change Wi-Fi SSID, credentials, and administrative passwords without needing any prior session or authentication. Although no public exploits are currently known, the vulnerability poses a significant risk to network security and device integrity. The absence of authentication on sensitive API endpoints enables attackers to gain persistent control over affected routers. European organizations using these devices could face network compromise, data interception, or lateral movement risks. Mitigation requires immediate firmware updates when available, network segmentation to restrict local access, and monitoring for unauthorized configuration changes. Countries with higher adoption of Shenzhen Zhibotong networking equipment and critical infrastructure relying on these routers are at greater risk. Given the ease of exploitation and potential impact on confidentiality, integrity, and availability, this vulnerability is assessed as high severity.

AI-Powered Analysis

AILast updated: 02/11/2026, 17:45:36 UTC

Technical Analysis

CVE-2025-65128 identifies a critical security vulnerability in the web management API components of Shenzhen Zhibotong Electronics ZBT WE2001 routers. The core issue is the absence of an authentication mechanism for certain API operations, specifically those whose names end with "*_nocommit". These API endpoints allow modification of router and network configurations without requiring any form of authentication or an existing session, provided the attacker is on the local network. By invoking these operations and supplying the expected parameters, an attacker can alter sensitive settings such as the Wi-Fi SSID, Wi-Fi credentials, and administrative passwords. This effectively grants the attacker unauthorized administrative control over the device. The vulnerability arises from improper access control design in the router's web management API, exposing critical configuration functions to unauthenticated local users. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it highly exploitable in environments where an attacker can gain local network access, such as compromised internal networks or via malicious insiders. The lack of authentication means that even low-skilled attackers with local network access can manipulate device configurations, potentially leading to network compromise, interception of traffic, or denial of service. The vulnerability affects all versions of the ZBT WE2001 router, though specific firmware versions are not detailed. No official patches or mitigations have been published yet, increasing the urgency for defensive measures. This vulnerability is particularly concerning for organizations relying on these routers for network connectivity and security, as it undermines the fundamental trust boundary of device management.

Potential Impact

For European organizations, this vulnerability presents a significant risk to network security and operational integrity. Unauthorized modification of router configurations can lead to multiple adverse outcomes: attackers can redirect network traffic by changing SSIDs and Wi-Fi credentials, enabling man-in-the-middle attacks or data exfiltration. Changing administrative passwords can lock out legitimate administrators, resulting in denial of service or persistent backdoor access. The compromise of router settings can facilitate lateral movement within corporate networks, potentially exposing sensitive data and critical systems. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the potential for disruption and data breaches. The local network access requirement limits remote exploitation but does not eliminate risk, as attackers can gain local access through compromised devices, insider threats, or physical proximity in shared office environments. The absence of known exploits currently reduces immediate threat levels but does not diminish the urgency to address the vulnerability before attackers develop and deploy exploits. The impact extends beyond individual organizations to potentially affect national cybersecurity posture where these devices are widely deployed.

Mitigation Recommendations

1. Immediate network segmentation: Restrict access to router management interfaces strictly to trusted administrative devices and VLANs to minimize local network exposure. 2. Monitor network traffic and router configuration changes for unusual activity, especially API calls ending with "*_nocommit" or unexpected configuration modifications. 3. Disable or restrict the web management API if possible until a vendor patch is available. 4. Implement strong physical security controls to prevent unauthorized local network access. 5. Engage with Shenzhen Zhibotong Electronics to obtain firmware updates or patches addressing this vulnerability; prioritize deployment once available. 6. Use network access control (NAC) solutions to limit device connectivity and enforce authentication before granting network access. 7. Educate IT staff and users about the risks of connecting unknown devices to internal networks. 8. Consider replacing affected routers with devices from vendors with stronger security postures if patches are delayed. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain up-to-date asset inventories to quickly identify affected devices within the network.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cbce54b57a58fa1aace42

Added to database: 2/11/2026, 5:31:17 PM

Last enriched: 2/11/2026, 5:45:36 PM

Last updated: 2/11/2026, 6:48:21 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats