Description
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References (3)
Core 3
Core References
Various Sources product
http://www.wodesys.com/eproductms52.html
Various Sources third-party-advisory
https://cert.pl/en/posts/2025/12/CVE-2025-65007
Scores
CVSS v4
8.7
EPSS
0.0010
EPSS Percentile
28.1%
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-306
Status
published
Products (3)
WODESYS/WD-R608U
WDR28081123OV1.01
WODESYS/WDR122B V2.0
WDR28081123OV1.01
WODESYS/WDR28
WDR28081123OV1.01
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026