CVE-2025-10880

7.5 HIGH

📋 TL;DR

Dingtian DT-R002 devices have an insufficiently protected credentials vulnerability that allows unauthenticated attackers to extract proprietary protocol passwords via simple GET requests. This affects all versions of the DT-R002 device, potentially exposing network credentials to unauthorized parties.

💻 Affected Systems

Products:
  • Dingtian DT-R002
Versions: All versions
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: All DT-R002 devices are vulnerable regardless of configuration. The vulnerability exists in the proprietary Dingtian Binary protocol implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to the proprietary protocol, potentially compromising the entire Dingtian ecosystem, performing unauthorized operations, or using extracted credentials for lateral movement.

🟠

Likely Case

Attackers extract protocol passwords and gain unauthorized access to Dingtian systems, potentially manipulating device configurations or intercepting communications.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments, though credentials remain exposed.

🌐 Internet-Facing: HIGH - Unauthenticated GET requests from internet sources can directly exploit this vulnerability without any authentication.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be exploited without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only sending a GET request to the vulnerable endpoint. No authentication or special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-268-01

Restart Required: No

Instructions:

No official patch available. Contact Dingtian vendor for firmware updates or replacement options.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DT-R002 devices in separate VLANs with strict firewall rules to prevent unauthorized access.

Access Control Lists

all

Implement network ACLs to restrict access to DT-R002 devices only to authorized management systems.

🧯 If You Can't Patch

  • Remove DT-R002 devices from internet-facing networks immediately
  • Implement strict network segmentation and monitor all traffic to/from DT-R002 devices

🔍 How to Verify

Check if Vulnerable:

Send GET request to DT-R002 device endpoint and check if proprietary protocol password is returned in response.

Check Version:

Check device firmware version via web interface or serial console (vendor-specific command)

Verify Fix Applied:

No fix available to verify. Monitor vendor for firmware updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests to DT-R002 endpoints
  • Multiple failed authentication attempts followed by successful credential extraction

Network Indicators:

  • Unusual traffic patterns to DT-R002 devices from unauthorized sources
  • GET requests to proprietary protocol endpoints

SIEM Query:

source_ip=* AND dest_ip=DT-R002_IP AND http_method=GET AND uri_contains="dingtian"

🔗 References

📤 Share & Export