An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware version: V6.02CN02) allowing an attacker with physical access to the UART pins to execute arbitrary commands due to presence of root terminal access on a serial interface without proper access control.
References
| Link | Resource |
|---|---|
| https://gist.github.com/whitej3rry/f142a93bac360f9b1126f552f64957ea | Exploit Third Party Advisory |
| https://github.com/whitej3rry/CVE-2025-65731 | Exploit Third Party Advisory |
| https://www.dlink.com/en/security-bulletin/ | Product |
| https://www.dlink.com/uk/en/products/dir-605l-wireless-n-300-home-cloud-router | Product |
| https://gist.github.com/whitej3rry/f142a93bac360f9b1126f552f64957ea | Exploit Third Party Advisory |
| https://github.com/whitej3rry/CVE-2025-65731 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 19:15
Updated : 2026-01-30 01:07
NVD link : CVE-2025-65731
Mitre link : CVE-2025-65731
CVE.ORG link : CVE-2025-65731
JSON object : View
Products Affected
dlink
- dir-605l_firmware
- dir-605l
CWE
CWE-306
Missing Authentication for Critical Function
