Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-65008
PUBLISHED
More InfoOfficial Page
Assigner-CERT-PL
Assigner Org ID-4bb8329e-dd38-46c1-aafb-9bf32bcb93c6
View Known Exploited Vulnerability (KEV) details
Published At-18 Dec, 2025 | 15:10
Updated At-18 Dec, 2025 | 18:52
Rejected At-
▼CVE Numbering Authority (CNA)
OS Command Injection in WODESYS WD-R608U router

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of validation in the langGet parameter in the adm.cgi endpoint, the malicious attacker can execute system shell commands. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version WDR28081123OV1.01 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Affected Products
Vendor
WODESYS
Product
WD-R608U
Default Status
unknown
Versions
Affected
  • WDR28081123OV1.01 (custom)
Vendor
WODESYS
Product
WDR28
Default Status
unknown
Versions
Affected
  • WDR28081123OV1.01 (custom)
Vendor
WODESYS
Product
WDR122B V2.0
Default Status
unknown
Versions
Affected
  • WDR28081123OV1.01 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
4.09.4CRITICAL
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 4.0
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-88CAPEC-88 OS Command Injection
CAPEC ID: CAPEC-88
Description: CAPEC-88 OS Command Injection
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Wojciech Cybowski
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.wodesys.com/eproductms52.html
product
https://cert.pl/en/posts/2025/12/CVE-2025-65007
third-party-advisory
https://github.com/wcyb/security_research
exploit
Hyperlink: http://www.wodesys.com/eproductms52.html
Resource:
product
Hyperlink: https://cert.pl/en/posts/2025/12/CVE-2025-65007
Resource:
third-party-advisory
Hyperlink: https://github.com/wcyb/security_research
Resource:
exploit
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found