CVE-2025-1104

7.3 HIGH

📋 TL;DR

This critical vulnerability in D-Link DHP-W310AV powerline adapters allows remote attackers to bypass authentication by spoofing. Attackers can gain unauthorized access to device management interfaces without valid credentials. Only users of DHP-W310AV version 1.04 are affected.

💻 Affected Systems

Products:
  • D-Link DHP-W310AV
Versions: Version 1.04
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network-connected devices, potential lateral movement to other systems, and unauthorized configuration changes to powerline adapters.

🟠

Likely Case

Unauthorized access to device management interface, potential network disruption, and exposure of network configuration details.

🟢

If Mitigated

Limited impact if devices are behind firewalls with restricted access and network segmentation is implemented.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely, making internet-facing devices immediately vulnerable to exploitation.
🏢 Internal Only: MEDIUM - Internal network devices remain vulnerable to attackers who gain initial network access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed on GitHub, making exploitation straightforward for attackers with basic knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.dlink.com/

Restart Required: No

Instructions:

Check D-Link website for firmware updates. If no patch is available, implement workarounds immediately.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DHP-W310AV devices on separate VLANs or network segments to limit attack surface

Access Control Lists

all

Implement firewall rules to restrict access to device management interfaces

🧯 If You Can't Patch

  • Replace affected devices with non-vulnerable models or different vendors
  • Disable remote management features and only allow local console access if possible

🔍 How to Verify

Check if Vulnerable:

Check device web interface or console for firmware version. If version is 1.04, device is vulnerable.

Check Version:

Check device web interface at http://[device-ip]/ or use console connection

Verify Fix Applied:

Verify firmware version has been updated to a version later than 1.04

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to device management interface
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual traffic patterns to device management ports (typically 80/443)
  • Spoofed authentication requests

SIEM Query:

source_ip=* AND (dest_port=80 OR dest_port=443) AND dest_ip=[device-ip] AND (http_method=POST AND uri_contains="login")

🔗 References

📤 Share & Export