CVE-2025-65011

N/A Unknown

📋 TL;DR

This vulnerability allows unauthorized users to access router configuration files by directly referencing them via URL. It affects WODESYS WD-R608U routers (also sold as WDR122B V2.0 and WDR28). Attackers can potentially view sensitive network configuration details without authentication.

💻 Affected Systems

Products:
  • WODESYS WD-R608U
  • WDR122B V2.0
  • WDR28
Versions: WDR28081123OV1.01 confirmed vulnerable, other versions likely affected
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vendor did not provide vulnerable version range. Only one version tested, but similar models likely affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full router configuration including admin credentials, network topology, and security settings, enabling complete network compromise.

🟠

Likely Case

Attackers access configuration files revealing network settings, potentially enabling further attacks or network reconnaissance.

🟢

If Mitigated

Limited exposure if router is behind firewall with strict access controls, though configuration details remain accessible to local attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct file access vulnerability requiring no authentication. Exploitation involves accessing specific URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided

Restart Required: No

Instructions:

No official patch available. Contact vendor for firmware updates.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to router web interface using firewall rules

Change Default Credentials

all

Change all default passwords to prevent credential harvesting

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules
  • Disable remote management features if not required

🔍 How to Verify

Check if Vulnerable:

Attempt to access configuration files via direct URL references on router web interface

Check Version:

Check router web interface or physical label for firmware version

Verify Fix Applied:

Test if configuration files remain accessible after applying controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to configuration file URLs
  • Multiple failed authentication attempts followed by configuration file access

Network Indicators:

  • HTTP requests to configuration file paths from unauthorized IPs
  • Unusual traffic patterns to router management interface

SIEM Query:

source_ip=external AND destination_ip=router_ip AND url_path CONTAINS 'config' OR 'backup'

🔗 References

📤 Share & Export