CVE-2025-65010
Broken Access Control in WODESYS WD-R608U Router Allows Admin Password Change
Publication date: 2025-12-18
Last updated on: 2025-12-18
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wodesys | wdr28 | * |
| wodesys | wd-r608u | wdr28081123ov1.01 |
| wodesys | wdr122b | * |
| wodesys | wd-r608u | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can have a significant impact as it allows a malicious attacker to take control of the router's administrative functions without permission. By changing the admin password, the attacker can lock out legitimate users, alter router settings, intercept or redirect network traffic, and potentially compromise the entire network connected to the router. [1]
Can you explain this vulnerability to me?
CVE-2025-65010 is a vulnerability in the WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) that allows an attacker to change the administrator panel password without any authorization. This occurs due to broken access control in the initial configuration wizard.cgi endpoint and can be exploited even after the initial configuration is completed. Essentially, an attacker can gain unauthorized administrative access to the router. [1]