CVE-2025-56311

6.5 MEDIUM

📋 TL;DR

This CVE describes an authenticated CSRF vulnerability in the web management interface of Shenzhen C-Data Technology Co. FD602GW-DX-R410 routers. An attacker can trick an authenticated administrator into visiting a malicious webpage that silently reboots the router, causing denial of service. Only administrators with active web interface sessions are affected.

💻 Affected Systems

Products:
  • Shenzhen C-Data Technology Co. FD602GW-DX-R410
Versions: firmware v2.2.14
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web management interface accessible and administrators with active sessions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained network disruption through repeated reboots, potentially causing extended downtime for connected devices and services.

🟠

Likely Case

Temporary network interruption when an administrator visits a malicious site, requiring manual intervention to restore connectivity.

🟢

If Mitigated

No impact if CSRF protections are implemented or administrators avoid untrusted websites while authenticated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to lure authenticated administrators to malicious sites. Proof-of-concept code is available in GitHub references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download latest firmware and apply through web interface.

🔧 Temporary Workarounds

Implement CSRF tokens

all

Add CSRF protection to the reboot endpoint if custom firmware modification is possible.

Log out after administration

all

Administrators should log out of web interface immediately after completing tasks.

🧯 If You Can't Patch

  • Restrict web management interface access to trusted internal networks only
  • Use browser extensions that block CSRF attempts or implement same-origin policies

🔍 How to Verify

Check if Vulnerable:

Check if firmware version is v2.2.14 and test if /boaform/admin/formReboot endpoint lacks CSRF tokens.

Check Version:

Check web interface system status page or use vendor-specific CLI commands if available.

Verify Fix Applied:

Verify firmware version is updated beyond v2.2.14 and test that reboot endpoint requires CSRF validation.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected reboot events in system logs
  • Multiple POST requests to /boaform/admin/formReboot from unusual sources

Network Indicators:

  • Sudden loss of connectivity followed by router reboot
  • HTTP requests to reboot endpoint from external IPs

SIEM Query:

source="router_logs" AND (event="reboot" OR uri="/boaform/admin/formReboot")

🔗 References

📤 Share & Export