Description
In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of validation in the langGet parameter in the adm.cgi endpoint, the malicious attacker can execute system shell commands. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
References (3)
Core 3
Core References
Various Sources product
http://www.wodesys.com/eproductms52.html
Various Sources third-party-advisory
https://cert.pl/en/posts/2025/12/CVE-2025-65007
Scores
CVSS v4
9.4
EPSS
0.0006
EPSS Percentile
19.2%
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (3)
WODESYS/WD-R608U
WDR28081123OV1.01
WODESYS/WDR122B V2.0
WDR28081123OV1.01
WODESYS/WDR28
WDR28081123OV1.01
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026