CVE-2025-60772

NETLINK · NETLINK HG322G

A critical improper authentication vulnerability has been identified in the web-based management interface of certain NETLINK devices.

Executive summary

A critical improper authentication vulnerability has been identified in the web-based management interface of certain NETLINK devices. This flaw allows a remote, unauthenticated attacker to gain full administrative control, potentially leading to a complete system compromise and the lockout of legitimate administrators from the device.

Vulnerability

The vulnerability exists within the web-based management interface of the affected device. Due to an improper authentication mechanism, the system fails to adequately verify user identity. A remote attacker can exploit this weakness by sending specially crafted requests to the management interface, bypassing authentication controls entirely and gaining administrative-level privileges. This access allows the attacker to view or modify system configurations, disrupt services, or change the administrator's password, thereby locking them out of the device.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete compromise of the affected network device. The business impact includes the potential for network traffic interception, unauthorized access to sensitive internal network segments, and service disruption. An attacker could use the compromised device as a pivot point to launch further attacks against the internal network, leading to a significant data breach or operational outage. The ability to lock out administrators would also delay detection and remediation efforts, increasing the overall impact of an incident.

Remediation

Immediate Action: Immediately apply security updates provided by the vendor to patch the affected devices. Prioritize patching for devices with management interfaces exposed to the internet. After patching, verify that the update has been successfully applied and that administrative access is functioning correctly.

Proactive Monitoring: Monitor device access logs for any unusual or unauthorized login attempts, especially from untrusted or external IP addresses. Scrutinize logs for unexpected configuration changes, such as password modifications or the creation of new administrative accounts. Network monitoring should be configured to detect anomalous traffic patterns originating from the affected devices, which could indicate a compromise.

Compensating Controls: If immediate patching is not feasible, implement network-level access controls to mitigate risk. Use a firewall to restrict access to the device's web-based management interface, allowing connections only from a dedicated, trusted management network or specific administrative IP addresses. Disable WAN/remote management on the device if it is not essential for business operations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity of this vulnerability, immediate action is required. We strongly recommend that all affected NETLINK devices be patched immediately, starting with those that are internet-facing. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its high-impact nature makes it a prime target for exploitation. Organizations should treat this vulnerability with the highest priority and apply both the recommended remediation and compensating controls without delay to prevent a full network compromise.