CVE-2025-63423

7.5 HIGH

📋 TL;DR

The Italy Wireless Mini Router WIRELESS-N 300M stores the administrator password insecurely, allowing unauthorized access to the device's administrative interface. This affects all users of this specific router model with the vulnerable firmware version.

💻 Affected Systems

Products:
  • Italy Wireless Mini Router WIRELESS-N 300M
Versions: v28K.MiniRouter.20190211
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this specific firmware version are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control of the router, enabling them to intercept network traffic, modify DNS settings, install malicious firmware, or use the device as an attack platform.

🟠

Likely Case

Local network attackers or anyone with physical access can extract the administrator password and gain unauthorized administrative access to the router configuration.

🟢

If Mitigated

If the router is not internet-facing and physical access is restricted, the risk is limited to authorized network users who might exploit the vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the stored password location, which may be accessible via local network access or physical access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates. If unavailable, consider replacing the device.

🔧 Temporary Workarounds

Change Default Administrator Password

all

Change the administrator password to a strong, unique password that is not stored in plaintext.

Login to router admin interface > Security/Administration settings > Change administrator password

Disable Remote Administration

all

Ensure remote administration (WAN access) is disabled to prevent internet-based attacks.

Login to router admin interface > Remote Management/Administration > Disable

🧯 If You Can't Patch

  • Replace the router with a secure model from a reputable vendor
  • Isolate the router on a separate network segment with strict access controls

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is v28K.MiniRouter.20190211, device is vulnerable.

Check Version:

Login to router admin interface and check Firmware/System Information page

Verify Fix Applied:

Verify firmware has been updated to a version later than v28K.MiniRouter.20190211, or check that administrator password is not stored in plaintext in accessible locations.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized login attempts to admin interface
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unexpected administrative access from unauthorized IPs
  • DNS configuration changes

SIEM Query:

Search for authentication events from router admin interface with source IPs not in allowed administrative range

🔗 References

📤 Share & Export