Critical security vulnerability reported in Dingtian DT-R0 devices
Take action: If you are using Dingtian DT-R0, make sure to isolate them from the internet into a separate network, accessible only from trusted networks. Then contact the vendor for a patch. If you don't get a response, start planning a replacement.
Learn More
A critical security vulnerability has been identified in Dingtian DT-R0 Series devices.
The flaw is tracked as CVE-2025-1283 (CVSS score 9.8) and allows unauthenticated attackers to bypass authentication mechanisms and gain administrator access to the devices by directly navigating to the main page, potentially compromising the entire system.
The vulnerability specifically affects the following Dingtian DT-R0 Series models and versions:
- DT-R002: Version V3.1.3044A
- DT-R008: Version V3.1.1759A
- DT-R016: Version V3.1.2776A
- DT-R032: Version V3.1.3826A
The security researcher Cumhur Kizilari (Zeus) reported this vulnerability to CISA. Dingtian has not responded to CISA's attempts to coordinate vulnerability mitigation, leaving users without an official patch or fix.
CISA advises users to isolate their control system networks behind firewalls, separating them from business networks, and ensuring devices are not directly accessible from the Internet. When remote access is necessary, CISA recommends using Virtual Private Networks (VPNs), while noting that VPNs should be kept updated due to their own potential vulnerabilities.
As of February 13, 2025, when this vulnerability was initially published, CISA has not received any reports of public exploitation specifically targeting this vulnerability.