All versions of Dingtian DT-R002 are vulnerable to an Insufficiently Protected Credentials vulnerability that could allow an attacker to retrieve the current user's username without authentication.
Fixes

Solution

Dingtian has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of affected versions of Dingtian DT-R002 are invited to contact Dingtian customer support https://www.dingtian-tech.com/en_us/aboutus.html  for additional information.


Workaround

The researchers recommend the following to help reduce risk: * Restrict access to HTTP (TCP/80), and the Dingtian Protocol on (UDP/60000) and (UDP/60001).

History

Thu, 25 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
Description All versions of Dingtian DT-R002 are vulnerable to an Insufficiently Protected Credentials vulnerability that could allow an attacker to retrieve the current user's username without authentication.
Title Insufficiently Protected Credentials in Dingtian DT-R002
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-25T16:31:26.280Z

Reserved: 2025-09-23T15:29:31.895Z

Link: CVE-2025-10879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-25T17:15:37.930

Modified: 2025-09-25T17:15:37.930

Link: CVE-2025-10879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.