CVE-2025-64075

10.0 CRITICAL

📋 TL;DR

A path traversal vulnerability in the ZBT WE2001 router's check_token function allows remote attackers to bypass authentication by manipulating session cookies. This enables unauthorized administrative actions on affected devices. Users of ZBT WE2001 routers with firmware version 23.09.27 are impacted.

💻 Affected Systems

Products:
  • Shenzhen Zhibotong Electronics ZBT WE2001
Versions: 23.09.27
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover, configuration modification, network traffic interception, and potential lateral movement to connected devices.

🟠

Likely Case

Unauthorized access to router admin panel, configuration changes, and potential network disruption.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and strong network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a specific session cookie value but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.zbtwifi.com

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Upload via admin interface. 4. Reboot device.

🔧 Temporary Workarounds

Restrict WAN Access

all

Block external access to router admin interface using firewall rules.

Change Default Credentials

all

Change admin passwords to strong, unique credentials.

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict access controls.
  • Implement network monitoring for unusual admin interface access patterns.

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or About page.

Check Version:

Login to router admin panel and navigate to system information page.

Verify Fix Applied:

Verify firmware version is updated beyond 23.09.27 and test authentication bypass attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful admin actions
  • Unusual session cookie values in HTTP requests

Network Indicators:

  • HTTP requests with crafted cookie values to admin endpoints
  • Unauthorized access to /cgi-bin/luci/admin paths

SIEM Query:

http.method=POST AND http.uri="/cgi-bin/luci" AND http.cookie CONTAINS "sysauth" AND NOT user.role="admin"

🔗 References

📤 Share & Export