- Description
- The Dingtian DT-R0 Series is vulnerable to an exploit that allows attackers to bypass login requirements by directly navigating to the main page.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2025-1283
@transilienceai
25 Feb 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
24 Feb 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
23 Feb 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
22 Feb 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
22 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
21 Feb 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
19 Feb 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
18 Feb 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 CVE-2025-1283 ⚠️🔴 CRITICAL (9.8) 🏢 Dingtian - DT-R002 🏗️ V3.1.3044A 🔗 https://t.co/oBQsX7PdSV 🔗 https://t.co/Q0jOLZYfOv #CyberCron #VulnAlert https://t.co/BLmCz2be36
@cybercronai
17 Feb 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
17 Feb 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
16 Feb 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
15 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
15 Feb 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
⚠️ Vulnerability Alert: Dingtian Products Authentication Bypass Vulnerability 📅 Timeline: Disclosure: 2025-02-14 📌 Attribution: 🆔cveId: CVE-2025-1283 📊baseScore: 9.8 📏cvssMetrics: (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) cvssSeverity: Critical 🔴 🛠️exploitMaturity: Not… h
@syedaquib77
14 Feb 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-1283
@transilienceai
14 Feb 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[CVE-2025-1283: CRITICAL] The Dingtian DT-R0 Series is vulnerable to an exploit that allows attackers to bypass login requirements by directly navigating to the main page.#cybersecurity,#vulnerability https://t.co/Ybn1mtvLHT https://t.co/4WxEcGufnY
@CveFindCom
13 Feb 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dingtian-tech:dt-r002_firmware:3.1.3044a:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FCDD272A-AB68-41C7-8F84-1353263EDB83"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dingtian-tech:dt-r002:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A66EBB54-A7E6-4627-9A00-AB11A5AF632B"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dingtian-tech:dt-r008_firmware:3.1.1759a:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7BAF5AD2-D97D-4AD3-AD81-3D7650383E13"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dingtian-tech:dt-r008:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DE107C89-F002-4E31-8DED-D342207152DF"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dingtian-tech:dt-r016_firmware:3.1.2776a:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7050E734-415B-4A61-94B4-BF70721C2F38"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dingtian-tech:dt-r016:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4870512F-79B8-486C-9F4A-4215733C89AD"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dingtian-tech:dt-r032_firmware:3.1.3826a:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3B2902EB-490A-41DB-B198-E6A614F77B56"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dingtian-tech:dt-r032:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7443447D-5BA5-4B70-952F-E33BB0043139"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]