Skip to main content

CVE-2025-8231: Hard-coded Credentials in D-Link DIR-890L

High
VulnerabilityCVE-2025-8231cvecve-2025-8231
Published: Sun Jul 27 2025 (07/27/2025, 13:32:05 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DIR-890L

Description

A vulnerability, which was classified as critical, has been found in D-Link DIR-890L up to 111b04. This issue affects some unknown processing of the file rgbin of the component UART Port. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 07/27/2025, 14:02:43 UTC

Technical Analysis

CVE-2025-8231 is a critical vulnerability identified in the D-Link DIR-890L router, specifically affecting firmware versions up to 111b04. The vulnerability arises from hard-coded credentials embedded within the device's UART port processing, particularly related to the handling of the 'rgbin' file component. This flaw allows an attacker with physical access to the device to exploit these hard-coded credentials to gain unauthorized access without requiring authentication or user interaction. The vulnerability does not affect currently supported products, as it is limited to legacy devices no longer maintained by D-Link. The CVSS 4.0 score of 7 indicates a high severity, with the attack vector being physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, as exploitation could allow full control over the device. Although no public exploits are currently known in the wild, the disclosure of the vulnerability and the presence of hard-coded credentials make it a significant risk for affected devices. The lack of patches or vendor support further exacerbates the threat, leaving devices vulnerable to compromise if physical access is obtained.

Potential Impact

For European organizations, the exploitation of CVE-2025-8231 could lead to severe security breaches, especially in environments where D-Link DIR-890L routers are still in use. Unauthorized access via hard-coded credentials could allow attackers to intercept or manipulate network traffic, disrupt network availability, or use the compromised device as a pivot point for further attacks within the corporate network. Given the physical access requirement, the threat is particularly relevant for organizations with less secure physical infrastructure or in shared office spaces. The inability to patch or update the affected devices increases the risk of persistent compromise. Additionally, compromised routers could lead to data leakage, impacting confidentiality and potentially violating GDPR regulations if personal data is exposed. The high impact on integrity and availability could disrupt business operations, causing financial and reputational damage.

Mitigation Recommendations

Since the affected devices are no longer supported and no patches are available, European organizations should prioritize the following mitigations: 1) Immediate inventory and identification of all D-Link DIR-890L routers in use, particularly firmware version 111b04 or earlier. 2) Physical security enhancements to prevent unauthorized access to network hardware, including locked server rooms and restricted access policies. 3) Replacement of affected devices with currently supported and patched hardware models from trusted vendors. 4) Network segmentation to isolate legacy devices from critical infrastructure and sensitive data environments. 5) Continuous monitoring for unusual network activity that could indicate device compromise. 6) Implement strict access control policies and network-level authentication mechanisms to reduce reliance on device-level credentials. 7) Educate staff about the risks of physical device tampering and enforce secure handling procedures for network equipment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T13:17:33.485Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68862dfbad5a09ad0074836c

Added to database: 7/27/2025, 1:47:39 PM

Last enriched: 7/27/2025, 2:02:43 PM

Last updated: 7/28/2025, 12:20:51 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats