Dingtian DT-R0 Series

Plan PatchCVSS 9.8ICS-CERT ICSA-25-044-18Feb 13, 2025
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

A vulnerability in Dingtian DT-R002, DT-R008, DT-R016, and DT-R032 routers (all versions V3.1.x) allows an unauthenticated attacker to modify device settings and gain administrator access through an authentication bypass flaw (CWE-288). The vulnerability affects all current versions of these products. Dingtian has not provided any patches and has not engaged with CISA on mitigation, indicating no vendor fix is planned.

What this means
What could happen
An unauthenticated attacker on the network could modify device settings and gain administrator access to the Dingtian DT-R routers, potentially allowing control of network traffic or disruption of connectivity to critical systems.
Who's at risk
Water utilities and municipal electric systems using Dingtian DT-R series routers for control system connectivity should be concerned. These devices handle network traffic for PLCs, SCADA systems, and other critical infrastructure, and administrator compromise could allow an attacker to intercept, modify, or block communications to field devices.
How it could be exploited
An attacker with network access to the DT-R device can send unauthenticated requests to exploit the authentication bypass vulnerability (CWE-288), directly modifying device settings and escalating privileges to administrator level without needing valid credentials.
Prerequisites
  • Network access to the DT-R device (direct or routed)
  • No authentication credentials required
remotely exploitableno authentication requiredlow complexityno patch availableaffects network boundary devices
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (4)
4 EOL
ProductAffected VersionsFix Status
DT-R002: V3.1.3044AV3.1.3044ANo fix (EOL)
DT-R008: V3.1.1759AV3.1.1759ANo fix (EOL)
DT-R016: V3.1.2776AV3.1.2776ANo fix (EOL)
DT-R032: V3.1.3826AV3.1.3826ANo fix (EOL)
Remediation & Mitigation
0/4
Do now
0/3
WORKAROUNDRestrict network access to DT-R devices by placing them behind a firewall and blocking inbound access from untrusted networks
HARDENINGIsolate DT-R devices from the business network to prevent remote exploitation from IT systems or the Internet
HARDENINGIf remote management access is required, implement a VPN or jump server as a single point of ingress and update it to the latest available version
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

WORKAROUNDMonitor the device for unauthorized configuration changes and unusual access patterns
API: /api/v1/advisories/706dc107-cfd6-421a-bcbf-3553d574ac59

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Dingtian DT-R0 Series | CVSS 9.8 - OTPulse