Authentication Flaw in WODESYS WD-R608U Router Exposes Command Execution Risk
CVE-2025-65007

8.7HIGH

Key Information:

Vendor

Wodesys

Vendor
CVE Published:
18 December 2025

Badges

๐Ÿ‘พ Exploit Exists

What is CVE-2025-65007?

The WODESYS WD-R608U router, also identified as WDR122B V2.0 and WDR28, is affected by a significant authentication flaw. This vulnerability allows unauthenticated attackers to access the configuration change module via the adm.cgi endpoint, enabling them to execute potentially harmful commands. With this access, an attacker could create device backups, restart the router, or even reset it to factory settings, compromising the integrity and availability of the device. Although only one version has been confirmed vulnerable, there remains potential for other versions to possess similar security weaknesses, highlighting the urgency for users to assess their devices.

Affected Version(s)

WD-R608U WDR28081123OV1.01

WDR122B V2.0 WDR28081123OV1.01

WDR28 WDR28081123OV1.01

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Wojciech Cybowski
.
CVE-2025-65007 : Authentication Flaw in WODESYS WD-R608U Router Exposes Command Execution Risk