Skip to main content

CVE-2025-8231: Hard-coded Credentials in D-Link DIR-890L

High
VulnerabilityCVE-2025-8231cvecve-2025-8231
Published: Sun Jul 27 2025 (07/27/2025, 13:32:05 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-890L

Description

A vulnerability, which was classified as critical, has been found in D-Link DIR-890L up to 111b04. This issue affects some unknown processing of the file rgbin of the component UART Port. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 08/04/2025, 01:07:02 UTC

Technical Analysis

CVE-2025-8231 is a critical vulnerability identified in the D-Link DIR-890L router, specifically affecting firmware versions up to 111b04. The vulnerability arises from hard-coded credentials embedded within the device's UART port processing, particularly related to the handling of the 'rgbin' file. This flaw allows an attacker with physical access to the device to exploit these hard-coded credentials to gain unauthorized access. Since the vulnerability is tied to the UART port, exploitation requires direct physical interaction with the hardware, such as connecting to the UART interface. The vulnerability does not require any authentication or user interaction beyond physical access, and the exploit has been publicly disclosed, increasing the risk of exploitation. However, the affected products are no longer supported by the vendor, meaning no official patches or firmware updates are available to remediate this issue. The CVSS 4.0 score is 7.0, reflecting a high severity level, with the attack vector being physical (AV:P), low attack complexity (AC:L), no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. The vulnerability does not affect network-exposed services directly but compromises device security through physical means, potentially allowing attackers to take full control of the device or extract sensitive information stored within it.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of the D-Link DIR-890L routers within their infrastructure. Organizations using these routers in critical network segments or for sensitive communications could face significant risks if an attacker gains physical access to the devices. Exploitation could lead to unauthorized network access, interception or manipulation of network traffic, and potential lateral movement within the network. Since the devices are no longer supported, organizations cannot rely on vendor patches, increasing the risk exposure. The physical access requirement limits remote exploitation but does not eliminate risk in environments where devices are accessible to unauthorized personnel, such as in shared office spaces, data centers with insufficient physical security, or remote branch offices. Additionally, the public disclosure of the exploit increases the likelihood of opportunistic attacks. The compromise of these routers could undermine network integrity and confidentiality, disrupt availability, and potentially serve as a foothold for further attacks against organizational assets.

Mitigation Recommendations

Given the lack of vendor support and absence of patches, European organizations should implement specific mitigations beyond generic advice: 1) Physically secure all D-Link DIR-890L devices to prevent unauthorized physical access, including locking network closets and securing office spaces. 2) Replace affected devices with currently supported routers that receive regular security updates to eliminate the vulnerability entirely. 3) If immediate replacement is not feasible, disable or restrict physical access to UART ports where possible, using hardware modifications or tamper-evident seals. 4) Monitor network traffic for unusual activity that could indicate device compromise, including unexpected configuration changes or unauthorized access attempts. 5) Implement network segmentation to limit the impact of a compromised router, isolating critical systems from less secure network segments. 6) Educate staff about the risks of physical device tampering and enforce strict access controls. 7) Maintain an inventory of all network devices to identify and prioritize vulnerable hardware for replacement or enhanced security controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T13:17:33.485Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68862dfbad5a09ad0074836c

Added to database: 7/27/2025, 1:47:39 PM

Last enriched: 8/4/2025, 1:07:02 AM

Last updated: 9/11/2025, 2:12:50 AM

Views: 87

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats