CVE-2025-1283
Published: 13 February 2025
Summary
CVE-2025-1283 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Dingtian-Tech Dt-R002 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to system resources, directly preventing authentication bypass via direct navigation to the main page.
Protects nonpublic system resources from unauthorized public access without identification and authentication, mitigating exploitation over network-accessible interfaces.
Limits and documents specific actions allowed without identification or authentication, ensuring critical functions like the main page require login.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass on network-accessible device directly enables remote exploitation of public-facing application without credentials.
NVD Description
The Dingtian DT-R0 Series is vulnerable to an exploit that allows attackers to bypass login requirements by directly navigating to the main page.
Deeper analysisAI
CVE-2025-1283, published on 2025-02-13, is a critical vulnerability in the Dingtian DT-R0 Series that enables attackers to bypass login requirements by directly navigating to the main page. This authentication bypass issue, linked to CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function), carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and potential for significant impact.
The vulnerability can be exploited by unauthenticated remote attackers with network access to the affected device, requiring low complexity and no user interaction. Successful exploitation allows bypassing authentication controls, granting direct access to the main page and potentially leading to high confidentiality, integrity, and availability impacts, such as unauthorized control over the device.
Mitigation guidance is available in the CISA ICS Advisory ICSA-25-044-18 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18, with additional vendor contact information at https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us. Security practitioners should consult these resources for patching or workaround details specific to the Dingtian DT-R0 Series.
Details
- CWE(s)