CVE-2025-10879

5.3 MEDIUM

📋 TL;DR

Dingtian DT-R002 devices have an insufficiently protected credentials vulnerability that allows unauthenticated attackers to retrieve the current username. This affects all versions of DT-R002 devices and could facilitate further attacks by revealing user account information.

💻 Affected Systems

Products:
  • Dingtian DT-R002
Versions: All versions
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All DT-R002 devices are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate valid usernames and use them for credential stuffing, brute force attacks, or social engineering to gain unauthorized access to the system.

🟠

Likely Case

Attackers discover valid usernames which could be used for targeted password attacks or to map the system's user structure.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to information disclosure about user accounts.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can easily retrieve usernames without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this to gather reconnaissance data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated username retrieval, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware update

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-268-01

Restart Required: Yes

Instructions:

1. Contact Dingtian for latest firmware. 2. Backup current configuration. 3. Apply firmware update. 4. Reboot device. 5. Verify fix.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DT-R002 devices from untrusted networks and internet exposure

Access Control Lists

all

Implement strict network ACLs to limit access to DT-R002 management interfaces

🧯 If You Can't Patch

  • Segment DT-R002 devices in isolated network zones with no internet access
  • Implement strict firewall rules to allow only trusted IP addresses to access DT-R002 management interfaces

🔍 How to Verify

Check if Vulnerable:

Attempt to retrieve username via unauthenticated request to the vulnerable endpoint (specific endpoint not disclosed in advisory)

Check Version:

Check device web interface or CLI for firmware version information

Verify Fix Applied:

After patching, verify that unauthenticated requests no longer return username information

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts following username enumeration
  • Unusual access patterns to user information endpoints

Network Indicators:

  • Unusual traffic to DT-R002 management interfaces from untrusted sources
  • Requests to username-related endpoints without authentication

SIEM Query:

source_ip NOT IN trusted_networks AND destination_port IN [management_ports] AND http_method IN [GET,POST] AND uri CONTAINS 'user'

🔗 References

📤 Share & Export