CVE-2025-65010
Unknown Unknown - Not Provided
Broken Access Control in WODESYS WD-R608U Router Allows Admin Password Change

Publication date: 2025-12-18

Last updated on: 2025-12-18

Assigner: CERT.PL

Description
WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
wodesys wdr28 *
wodesys wd-r608u wdr28081123ov1.01
wodesys wdr122b *
wodesys wd-r608u *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can have a significant impact as it allows a malicious attacker to take control of the router's administrative functions without permission. By changing the admin password, the attacker can lock out legitimate users, alter router settings, intercept or redirect network traffic, and potentially compromise the entire network connected to the router. [1]


Can you explain this vulnerability to me?

CVE-2025-65010 is a vulnerability in the WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) that allows an attacker to change the administrator panel password without any authorization. This occurs due to broken access control in the initial configuration wizard.cgi endpoint and can be exploited even after the initial configuration is completed. Essentially, an attacker can gain unauthorized administrative access to the router. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart