CVE-2025-65010

HIGH

WODESYS WD-R608U - Auth Bypass

Title source: llm
STIX 2.1

Description

WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) is vulnerable to Broken Access Control in initial configuration wizard.cgi endpoint. Malicious attacker can change admin panel password without authorization. The vulnerability can also be exploited after the initial configuration has been set. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

References (3)

Core 3
Core References
Various Sources third-party-advisory
https://cert.pl/posts/2025/12/CVE-2025-65007

Scores

CVSS v4 7.1
EPSS 0.0003
EPSS Percentile 8.0%
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-306
Status published
Products (3)
WODESYS/WD-R608U WDR28081123OV1.01
WODESYS/WDR122B V2.0 WDR28081123OV1.01
WODESYS/WDR28 WDR28081123OV1.01
Published Dec 18, 2025
Tracked Since Feb 18, 2026