CVE-2025-44178

6.5 MEDIUM

📋 TL;DR

DASAN GPON ONU H660WM routers with firmware version H660WMR210825 have improper access control in default settings, allowing attackers to access sensitive information and modify configurations via UPnP protocol without authentication. This affects all users with these devices in default configuration.

💻 Affected Systems

Products:
  • DASAN GPON ONU H660WM
Versions: H660WMR210825
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with default settings where UPnP is enabled on WAN interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could reconfigure the router to intercept all network traffic, install malware on connected devices, or use the device as part of a botnet.

🟠

Likely Case

Attackers would gain unauthorized access to router configuration, potentially changing DNS settings, exposing internal services, or stealing credentials.

🟢

If Mitigated

With proper access controls and UPnP disabled, the attack surface is significantly reduced to authenticated attacks only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the UPnP service on the WAN interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for updated firmware

Vendor Advisory: https://gist.github.com/stevenyu113228/a1fab78fa34a86f7416aa2aa33284fd1

Restart Required: Yes

Instructions:

1. Contact DASAN Networks for updated firmware. 2. Download and verify firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable UPnP on WAN interface

all

Prevents unauthorized access via UPnP protocol from external networks

Change default credentials

all

Ensure strong authentication is enabled for router administration

🧯 If You Can't Patch

  • Place router behind a firewall that blocks UPnP traffic (port 1900/udp) from external networks
  • Implement network segmentation to isolate the vulnerable device from critical systems

🔍 How to Verify

Check if Vulnerable:

Check if UPnP is enabled on WAN interface in router configuration and verify firmware version is H660WMR210825

Check Version:

Login to router admin interface and check firmware version in system information

Verify Fix Applied:

After firmware update, verify UPnP is properly restricted and test that unauthorized UPnP requests from WAN are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized UPnP discovery requests from external IPs
  • Configuration changes without admin login

Network Indicators:

  • UPnP M-SEARCH packets from external sources to port 1900/udp
  • Unexpected configuration changes via UPnP

SIEM Query:

source_ip=external AND dest_port=1900 AND protocol=UDP AND payload CONTAINS "M-SEARCH"

🔗 References

📤 Share & Export