CVE-2025-60772
Published: 21 October 2025
Summary
CVE-2025-60772 is a critical-severity Improper Authentication (CWE-287) vulnerability in Netlinkict (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Prohibits sensitive actions like privilege escalation in the web management interface without identification or authentication, directly mitigating the improper authentication vulnerability.
Requires identification and authentication for non-organizational users, preventing remote unauthenticated attackers from exploiting the management interface for privilege escalation.
Enforces approved authorizations for access to system resources, countering the failure to properly enforce authentication in crafted HTTP requests leading to privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of web management interface (T1190) enables privilege escalation to gain full device control (T1068).
NVD Description
Improper authentication in the web-based management interface of NETLINK HG322G V1.0.00-231017, allows a remote unauthenticated attacker to escalate privileges and lock out the legitimate administrator via crafted HTTP requests.
Deeper analysisAI
CVE-2025-60772 is an improper authentication vulnerability (CWE-287) in the web-based management interface of the NETLINK HG322G router running firmware version V1.0.00-231017. Published on 2025-10-21, it has a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility, low attack complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability.
A remote unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests to the management interface, enabling privilege escalation and the ability to lock out the legitimate administrator. Successful exploitation grants the attacker administrative control over the device, potentially allowing full compromise including unauthorized access to configurations, data, and network functions.
Advisories and mitigation details are available in referenced sources, including the vulnerability report at https://github.com/navy-birds-MRS/vuln-reports/blob/main/vendors/netlink/CVE-2025-60772/advisory.md and the product page at https://netlinkict.com/shop/gpon-ont/gpon-ont-hg322g/.
Details
- CWE(s)