Vulnerability Description
An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-605L Firmware | 6.02cn02 |
| Dlink | Dir-605L | f1 |
Related Weaknesses (CWE)
References
- https://gist.github.com/whitej3rry/f142a93bac360f9b1126f552f64957eaExploitThird Party Advisory
- https://github.com/whitej3rry/CVE-2025-65731ExploitThird Party Advisory
- https://www.dlink.com/en/security-bulletin/Product
- https://www.dlink.com/uk/en/products/dir-605l-wireless-n-300-home-cloud-routerProduct
- https://gist.github.com/whitej3rry/f142a93bac360f9b1126f552f64957eaExploitThird Party Advisory
- https://github.com/whitej3rry/CVE-2025-65731ExploitThird Party Advisory
FAQ
What is CVE-2025-65731?
CVE-2025-65731 is a vulnerability with a CVSS score of 6.8 (MEDIUM). An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to pre...
How severe is CVE-2025-65731?
CVE-2025-65731 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65731?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-605L Firmware, Dlink Dir-605L.