CVE-2025-0355

7.5 HIGH

📋 TL;DR

A missing authentication vulnerability in multiple NEC Aterm router models allows attackers to retrieve Wi-Fi passwords without authentication. This affects users running vulnerable firmware versions on listed NEC Aterm routers. Attackers on the same network can exploit this to gain unauthorized access to Wi-Fi credentials.

💻 Affected Systems

Products:
  • NEC Aterm WG2600HS
  • WF1200CRS
  • WG1200CRS
  • GB1200PE
  • WG2600HP4
  • WG2600HM4
  • WG2600HS2
  • WX3000HP
  • WX4200D5
Versions: WG2600HS ≤1.7.2, WF1200CRS ≤1.6.0, WG1200CRS ≤1.5.0, GB1200PE ≤1.3.0, WG2600HP4 ≤1.4.2, WG2600HM4 ≤1.4.2, WG2600HS2 ≤1.3.2, WX3000HP ≤2.4.2, WX4200D5 ≤1.2.4
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain Wi-Fi password, pivot to internal network, intercept traffic, and potentially compromise connected devices.

🟠

Likely Case

Local attackers retrieve Wi-Fi password and gain unauthorized network access for surveillance or further attacks.

🟢

If Mitigated

With proper network segmentation and monitoring, impact limited to isolated network segment.

🌐 Internet-Facing: LOW (requires local network access for exploitation)
🏢 Internal Only: HIGH (exploitable by anyone on local network without authentication)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access but no authentication. Simple HTTP requests likely sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions per model

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv25-003_en.html

Restart Required: Yes

Instructions:

1. Access router admin interface. 2. Check current firmware version. 3. Download latest firmware from NEC support site. 4. Upload and apply firmware update. 5. Reboot router.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface to trusted VLAN

Access Control

all

Restrict physical and wireless access to trusted devices only

🧯 If You Can't Patch

  • Replace affected routers with updated models or different vendors
  • Implement strict network monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against affected versions list

Check Version:

Login to router admin interface and check firmware version in system settings

Verify Fix Applied:

Confirm firmware version is above affected range after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to router management interface
  • Unusual HTTP requests to router endpoints

Network Indicators:

  • Unexpected devices connecting to Wi-Fi
  • Suspicious traffic from router management interface

SIEM Query:

source="router.log" AND ("authentication_failed" OR "unauthorized_access")

🔗 References

📤 Share & Export