CVE-2025-61234

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers on the local network to interact with Dataphone A920 devices via port 8888 without credentials. The exposed service reveals device information and functionality, potentially enabling further attacks. Organizations using Dataphone A920 v2025.07.161103 with default configurations are affected.

💻 Affected Systems

Products:
  • Dataphone A920
Versions: v2025.07.161103
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with port 8888 accessible on local network (default configuration)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing data theft, service disruption, or use as a foothold for lateral movement within the network.

🟠

Likely Case

Information disclosure revealing device details, functionality, and potentially sensitive operational data to local network attackers.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized access to port 8888.

🌐 Internet-Facing: LOW (service is exposed only on local network by default)
🏢 Internal Only: HIGH (local network attackers can access without authentication)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple TCP socket interaction or HTTP request triggers information disclosure; GitHub reference shows proof of concept

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Monitor vendor for security updates.

🔧 Temporary Workarounds

Block port 8888 with firewall

all

Prevent access to vulnerable service using network firewall rules

iptables -A INPUT -p tcp --dport 8888 -j DROP
netsh advfirewall firewall add rule name="Block Dataphone 8888" dir=in action=block protocol=TCP localport=8888

Network segmentation

all

Isolate Dataphone devices on separate VLAN with strict access controls

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can reach port 8888
  • Monitor network traffic to port 8888 for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Run: telnet [device_ip] 8888 or curl http://[device_ip]:8888 - if connection succeeds without authentication, device is vulnerable

Check Version:

Check device configuration interface or physical label for version information

Verify Fix Applied:

Attempt to connect to port 8888 - connection should be refused or timeout if firewall rules are working

📡 Detection & Monitoring

Log Indicators:

  • Unexpected connections to port 8888
  • HTTP requests to port 8888 returning error responses

Network Indicators:

  • TCP connections to port 8888 from unauthorized IPs
  • HTTP traffic on non-standard port 8888

SIEM Query:

destination_port=8888 AND (protocol="TCP" OR http_user_agent="*")

🔗 References

📤 Share & Export