Cyber Posture

CVE-2025-1283

Critical

Published: 13 February 2025

Published
13 February 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1283 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Dingtian-Tech Dt-R002 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for logical access to system resources, directly preventing authentication bypass via direct navigation to the main page.

prevent

Protects nonpublic system resources from unauthorized public access without identification and authentication, mitigating exploitation over network-accessible interfaces.

prevent

Limits and documents specific actions allowed without identification or authentication, ensuring critical functions like the main page require login.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authentication bypass on network-accessible device directly enables remote exploitation of public-facing application without credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Dingtian DT-R0 Series is vulnerable to an exploit that allows attackers to bypass login requirements by directly navigating to the main page.

Deeper analysisAI

CVE-2025-1283, published on 2025-02-13, is a critical vulnerability in the Dingtian DT-R0 Series that enables attackers to bypass login requirements by directly navigating to the main page. This authentication bypass issue, linked to CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function), carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and potential for significant impact.

The vulnerability can be exploited by unauthenticated remote attackers with network access to the affected device, requiring low complexity and no user interaction. Successful exploitation allows bypassing authentication controls, granting direct access to the main page and potentially leading to high confidentiality, integrity, and availability impacts, such as unauthorized control over the device.

Mitigation guidance is available in the CISA ICS Advisory ICSA-25-044-18 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18, with additional vendor contact information at https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us. Security practitioners should consult these resources for patching or workaround details specific to the Dingtian DT-R0 Series.

Details

CWE(s)

Affected Products

dingtian-tech
dt-r002 firmware
3.1.3044a
dingtian-tech
dt-r008 firmware
3.1.1759a
dingtian-tech
dt-r016 firmware
3.1.2776a
dingtian-tech
dt-r032 firmware
3.1.3826a

CVEs Like This One

CVE-2025-0159Shared CWE-288, CWE-306
CVE-2024-13771Shared CWE-288, CWE-306
CVE-2025-59367Shared CWE-288, CWE-306
CVE-2026-22731Shared CWE-288, CWE-306
CVE-2025-61673Shared CWE-288, CWE-306
CVE-2026-40630Shared CWE-288
CVE-2025-13539Shared CWE-288
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-5955Shared CWE-288

References