Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-22886

Summary
Assigner-eclipse
Assigner Org ID-e51fbebd-6053-4e49-959f-1b94eeb69a2c
Published At-03 Mar, 2026 | 09:18
Updated At-03 Mar, 2026 | 14:51
Rejected At-
Credits

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:eclipse
Assigner Org ID:e51fbebd-6053-4e49-959f-1b94eeb69a2c
Published At:03 Mar, 2026 | 09:18
Updated At:03 Mar, 2026 | 14:51
Rejected At:
▼CVE Numbering Authority (CNA)

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

Affected Products
Vendor
Eclipse Foundation AISBLEclipse Foundation
Product
Eclipse OpenMQ
Repo
https://github.com/eclipse-ee4j/openmq
Default Status
unaffected
Versions
Affected
  • 0
Problem Types
TypeCWE IDDescription
CWECWE-1392CWE-1392 Use of Default Credentials
CWECWE-1393CWE-1393 Use of Default Password
CWECWE-1391CWE-1391 Use of Weak Credentials
Type: CWE
CWE ID: CWE-1392
Description: CWE-1392 Use of Default Credentials
Type: CWE
CWE ID: CWE-1393
Description: CWE-1393 Use of Default Password
Type: CWE
CWE ID: CWE-1391
Description: CWE-1391 Use of Weak Credentials
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Camilo G. AkA Dedalo (DeepSecurity Perú)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://gitlab.eclipse.org/security/cve-assignment/-/issues/85
N/A
Hyperlink: https://gitlab.eclipse.org/security/cve-assignment/-/issues/85
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:emo@eclipse.org
Published At:03 Mar, 2026 | 10:16
Updated At:03 Mar, 2026 | 10:16

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-1391Primaryemo@eclipse.org
CWE-1392Primaryemo@eclipse.org
CWE-1393Primaryemo@eclipse.org
CWE ID: CWE-1391
Type: Primary
Source: emo@eclipse.org
CWE ID: CWE-1392
Type: Primary
Source: emo@eclipse.org
CWE ID: CWE-1393
Type: Primary
Source: emo@eclipse.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gitlab.eclipse.org/security/cve-assignment/-/issues/85emo@eclipse.org
N/A
Hyperlink: https://gitlab.eclipse.org/security/cve-assignment/-/issues/85
Source: emo@eclipse.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2024-9342
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 21.17%
||
7 Day CHG~0.00%
Published-16 Jul, 2025 | 10:14
Updated-16 Jul, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Eclipse GlassFish version 7.0.16 or earlier it is possible to perform Login Brute Force attacks as there is no limitation in the number of failed login attempts.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-glassfishEclipse Glassfish
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-55086
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 22.71%
||
7 Day CHG~0.00%
Published-20 Oct, 2025 | 17:49
Updated-24 Oct, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NetXDuo version before 6.4.4, a networking support module for Eclipse Foundation ThreadX, in the DHCPV6 client there was an unchecked index extracting the server DUID from the server reply. With a crafted packet, an attacker could cause an out of memory read.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-threadx_netx_duoNextX Duo
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1285
Improper Validation of Specified Index, Position, or Offset in Input
CVE-2025-55089
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-9.2||CRITICAL
EPSS-0.11% / 30.14%
||
7 Day CHG~0.00%
Published-16 Oct, 2025 | 06:33
Updated-20 Jan, 2026 | 21:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eclipse ThreadX FileX RAM disk driver buffer overflow

In FileX before 6.4.2, the file support module for Eclipse Foundation ThreadX, there was a possible buffer overflow in the FileX RAM disk driver. It could cause a remote execurtion after receiving a crafted sequence of packets

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-threadx_filexFileX
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2026-1188
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 5.20%
||
7 Day CHG~0.00%
Published-29 Jan, 2026 | 08:36
Updated-09 Feb, 2026 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Eclipse OMR port library component since release 0.2.0, an API function to return the textual names of all supported processor features was not accounting for the separator inserted between processor features. If the output buffer supplied to this function was incorrectly sized, failing to account for the separator when determining when a write to the buffer was safe could lead to a buffer overflow. This issue is fixed in Eclipse OMR version 0.8.0.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-omrEclipse OMR
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-131
Incorrect Calculation of Buffer Size
CVE-2024-2452
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-7||HIGH
EPSS-0.14% / 34.13%
||
7 Day CHG~0.00%
Published-26 Mar, 2024 | 15:43
Updated-13 Feb, 2025 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer wraparound, under-allocation, and heap buffer overflow in Eclipse ThreadX NetX Duo __portable_aligned_alloc()

In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-threadx_netx_duoThreadX
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2024-0740
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-9.8||CRITICAL
EPSS-12.36% / 93.77%
||
7 Day CHG~0.00%
Published-26 Apr, 2024 | 09:36
Updated-03 Feb, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eclipse Target Management <= 4.5.500 Command Injection

Eclipse Target Management: Terminal and Remote System Explorer (RSE) version <= 4.5.400 has a remote code execution vulnerability that does not require authentication. The fixed version is included in Eclipse IDE 2024-03

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-target_managementEclipse Target Managementeclipse_ide
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-9408
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-8.9||HIGH
EPSS-0.06% / 17.03%
||
7 Day CHG~0.00%
Published-16 Jul, 2025 | 11:15
Updated-16 Jul, 2025 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Eclipse GlassFish since version 6.2.5 it is possible to perform a Server Side Request Forgery attack in specific endpoints.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-glassfishEclipse Glassfish
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2023-5763
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-6.8||MEDIUM
EPSS-0.15% / 36.10%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 06:40
Updated-05 Sep, 2024 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Glassfish remote code execution

In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or < 7u201, or < 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-glassfishGlassfish
CWE ID-CWE-913
Improper Control of Dynamically-Managed Code Resources
CWE ID-CWE-20
Improper Input Validation
CVE-2023-4760
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-7.6||HIGH
EPSS-0.38% / 58.85%
||
7 Day CHG~0.00%
Published-21 Sep, 2023 | 07:35
Updated-24 Sep, 2024 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution in Eclipse RAP on Windows

In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-remote_application_platformEclipse RAP
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-10525
Matching Score-8
Assigner-Eclipse Foundation
ShareView Details
Matching Score-8
Assigner-Eclipse Foundation
CVSS Score-7.2||HIGH
EPSS-17.51% / 94.98%
||
7 Day CHG~0.00%
Published-30 Oct, 2024 | 11:41
Updated-03 Nov, 2025 | 21:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eclipse Mosquito: Heap Buffer Overflow in my_subscribe_callback

In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-mosquittomosquittomosquitto
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-10542
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.05%
||
7 Day CHG~0.00%
Published-25 Sep, 2025 | 14:35
Updated-03 Nov, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Default Admin Credentials Enable Full Administrative Access in iMonitor EAM

iMonitor EAM 9.6394 ships with default administrative credentials that are also displayed within the management client’s connection dialog. If the administrator does not change these defaults, a remote attacker can authenticate to the EAM server and gain full control over monitored agents and data. This enables reading highly sensitive telemetry (including keylogger output) and issuing arbitrary actions to all connected clients.

Action-Not Available
Vendor-iMonitor Software Inc.
Product-iMonitor EAM
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-7898
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.27% / 50.37%
||
7 Day CHG~0.00%
Published-17 Aug, 2024 | 18:00
Updated-27 Sep, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tosei Online Store Management System ネット店舗管理システム Backend default credentials

A vulnerability classified as critical was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. This vulnerability affects unknown code of the component Backend. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-tosei-corporationToseitosei
Product-online_store_management_systemOnline Store Management System ネット店舗管理システムonline_store_management_system
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-7746
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-9.5||CRITICAL
EPSS-0.25% / 48.20%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 15:14
Updated-12 Oct, 2025 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of default credentials at Traccar fleet management solution

Use of Default Credentials vulnerability in Tananaev Solutions Traccar Server on Administrator Panel modules allows Authentication Abuse.This issue affects the privileged transactions implemented by the Traccar solution that should otherwise be protected by the authentication mechanism.  These transactions could have an impact on any sensitive aspect of the platform, including Confidentiality, Integrity and Availability.

Action-Not Available
Vendor-traccarTraccartraccar
Product-traccarServerserver
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-287
Improper Authentication
CVE-2024-6788
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.6||HIGH
EPSS-4.54% / 89.02%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 13:15
Updated-22 Aug, 2025 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-charx_sec-3100charx_sec-3100_firmwarecharx_sec-3050_firmwarecharx_sec-3050charx_sec-3150charx_sec-3150_firmwarecharx_sec-3000_firmwarecharx_sec-3000CHARX SEC-3050CHARX SEC-3150CHARX SEC-3000CHARX SEC-3100charx_sec_3150
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-45249
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-9.8||CRITICAL
EPSS-93.34% / 99.81%
||
7 Day CHG+0.14%
Published-24 Jul, 2024 | 14:03
Updated-22 Oct, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-08-19||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)
Product-cyber_infrastructureAcronis Cyber Infrastructurecyber_infrastructureCyber Infrastructure (ACI)
CWE ID-CWE-1393
Use of Default Password
CVE-2023-3703
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-10||CRITICAL
EPSS-0.08% / 22.83%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 14:19
Updated-30 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Proscend Advice ICR Series routers fw version 1.76

Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials

Action-Not Available
Vendor-proscendProscend Adviceproscend
Product-a510-f1m360-pm350-6m350-w6_firmwarem301-g_firmwarem560-5g_firmwarem350-6_firmwarem330-wa520i-f1_firmwarem357-5gm331_firmwarem350-5g_firmwarem330-w5m301-gm357-ai_firmwarem301-gwm357-5g_firmwarem331m301-gw_firmwarea551i-f1a551i-f1_firmwarea510-l1_firmwarea543i-l1_firmwarem350-5gm330-w5_firmwarem560-5ga520i-f1a552i-f1_firmwarea552i-f1m357-aia551i-f4m350-w5g_firmwarea551i-f4_firmwarem350-w5gm330-w_firmwarea510-l1m360-p_firmwarem350-w6a510-f1_firmwarea543i-l1ICR Series routers FWicr_series_routers_fw
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-30603
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.59% / 68.91%
||
7 Day CHG+0.06%
Published-02 Jun, 2023 | 00:00
Updated-08 Jan, 2025 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hitron Technologies Inc. CODA-5310 - Using default credentials

Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.

Action-Not Available
Vendor-hitrontechHitron Technologies Inc.
Product-coda-5310_firmwarecoda-5310Hitron CODA-5310
CWE ID-CWE-1392
Use of Default Credentials
CVE-2026-26341
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.30%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 18:40
Updated-26 Feb, 2026 | 17:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.

Action-Not Available
Vendor-tattileTattile s.r.l.
Product-tolling\+_firmwarevega53smart\+_traffic_light_firmwarebasic_mk2smart\+_speedbasic_mk2_firmwarevega33_firmwarevega11smart\+vega53_firmwarevega11_firmwaresmart\+_traffic_lightanpr_mobile_firmwaresmart\+_speed_firmwarevega33axle_counter_firmwareaxle_countersmart\+_firmwaretolling\+anpr_mobileVega53Basic MK2ANPR MobileSmart+ SpeedVega11Vega33Smart+Tolling+Axle CounterSmart+ Traffic Light
CWE ID-CWE-1392
Use of Default Credentials
CVE-2026-26366
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 13.91%
||
7 Day CHG+0.01%
Published-15 Feb, 2026 | 15:29
Updated-26 Feb, 2026 | 22:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default Credentials

eNet SMART HOME server 2.2.1 and 2.3.1 ships with default credentials (user:user, admin:admin) that remain active after installation and commissioning without enforcing a mandatory password change. Unauthenticated attackers can use these default credentials to gain administrative access to sensitive smart home configuration and control functions.

Action-Not Available
Vendor-jung-groupJUNG
Product-enet_smart_homeeNet SMART HOME server
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-8077
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.20%
||
7 Day CHG+0.01%
Published-17 Sep, 2025 | 12:33
Updated-26 Feb, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NeuVector admin account has insecure default password

A vulnerability exists in NeuVector versions up to and including 5.4.5, where a fixed string is used as the default password for the built-in `admin` account. If this password is not changed immediately after deployment, any workload with network access within the cluster could use the default credentials to obtain an authentication token. This token can then be used to perform any operation via NeuVector APIs.

Action-Not Available
Vendor-SUSE
Product-neuvector
CWE ID-CWE-1393
Use of Default Password
CVE-2025-8731
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-9.3||CRITICAL
EPSS-0.21% / 43.59%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 15:32
Updated-13 Aug, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials

A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: "For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid."

Action-Not Available
Vendor-TRENDnet, Inc.
Product-TI-G160iTPL-430APTI-PG102i
CWE ID-CWE-1392
Use of Default Credentials
CVE-2023-28094
Matching Score-4
Assigner-Pegasystems Inc.
ShareView Details
Matching Score-4
Assigner-Pegasystems Inc.
CVSS Score-8.1||HIGH
EPSS-0.22% / 44.06%
||
7 Day CHG~0.00%
Published-22 Jun, 2023 | 00:00
Updated-06 Dec, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pega platform clients who are using versions 7.4 through 8.8.x and have upgraded from a version prior to 8.x may be utilizing default credentials.

Action-Not Available
Vendor-pegaPegasystems
Product-pega_platformPega Platform
CWE ID-CWE-1393
Use of Default Password
CVE-2025-66050
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.45%
||
7 Day CHG~0.00%
Published-09 Jan, 2026 | 11:53
Updated-14 Jan, 2026 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No password set for administrative account in Vivotek IP7137 cameras

Vivotek IP7137 camera with firmware version 0200a by default dos not require to provide any password when logging in as an administrator. While it is possible to set up such a password, a user is not informed about such a need. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

Action-Not Available
Vendor-vivotekVivotek
Product-ip7137_firmwareip7137IP7137
CWE ID-CWE-1393
Use of Default Password
CVE-2024-51978
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-48.34% / 97.69%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 07:17
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass via default password generation affecting multiple models from Brother Industries, Ltd, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.

Action-Not Available
Vendor-Konica Minolta, Inc.Brother Industries, LtdToshiba Tec
Product-HL-L2865DWHL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L2400DWEDCP-B7578DWHL-L1232WMFC-L2717DWDCP-L6600DWMFC-7895DWMFC-J6580CDWMFC-J3930DWHL-L3240CDWDCP-T230HL-1218WMFC-L5802DWDCP-L2605DWMFC-J1170DWADS-3300Wbizhub 5020iMFC-L8690CDWMFC-J5340DWMFC-J5345DWHL-L2371DNPT-E550W (for Russia)MFC-B7810DWBMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWMFC-J3940DWHL-L2375DWRQL-1115NWBMFC-J1215WMFC-L6800DWDCP-L1632WDCP-L2640DWMFC-J1205W(XL)MFC-L5700DWHL-L6410DNDCP-L3560CDWDCP-L2520DWDCP-L5510DNDCP-L5500DNDCP-J982N-W/BDCP-T420WDCP-J4143NHL-L2350DWMFC-L2800DWMFC-J6730DWMFC-L2710DWRDCP-T435WDCP-L2627DWHL-L3300CDWHL-L2461DNMFC-L2860DWHL-B2150WMFC-L2860DWEMFC-J5845DW(XL)PT-P750WMFC-L6810DWPT-E550W (for Vietnum)MFC-J4345DW XLMFC-L5717DWDCP-L2627DWXLMFC-L2880DWDCP-L3555CDWHL-L3215CWMFC-9150CDNMFC-L6702DWDCP-C1210NHL-L6200DWMFC-J6955DWRJ-3150AiDCP-L3510CDWMFC-L2751DWDCP-B7640DWBDCP-L3551CDWHL-L2357DWTD-2350DDCP-T530DWHL-L6210DWSP-1 (for Japan)HL-L6412DWDCP-L2627DWEMFC-J1605DNDCP-1623WRDCP-9030CDNDCP-L2647DWMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L2366DWDCP-T226DCP-1610WEMFC-J4443NMFC-L5715DNMFC-J939DNTJ-4121TNRPT-D800WHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWHL-L2465DWMFC-L8610CDW(for Japan)MFC-L5900DWHL-L9310CDWDCP-B7620DWADS-1250WMFC-L5715DWMFC-L8395CDWHL-L2385DWMFC-J1012DWQL-810WHL-L6415DWTJ-4020TNDCP-1618WHL-L5210DWTHL-L2390DWMFC-L6912DWNFC-EX670HL-L3220CWDCP-L1848WMFC-L2817DWTD-4750TNWBRTJ-4021TNMFC-L5702DWHL-B2158WDCP-L2551DWNFC-J903NMFC-J497DWDCP-B7658DWPT-E550W (for US, EU)HL-L6402DWPT-P950NWMFC-J904NMFC-J939DWNDCP-L5652DNMFC-L8900CDWMFC-L2900DWXLMFC-L8340CDWMFC-7889DWDCP-1616NWDCP-J572NHL-L2360DWRJ-3150HL-L2351DWDCP-J981NDCP-J988NHL-L2350DWRTD-2350DFSAHL-3190CDWHL-L6217DWHL-L6450DWMFC-L2802DNMFC-L5750DWDCP-L5518DNHL-L2425DWTD-2125NQL-1110NWBcDCP-B7620DWBMFC-L9635CDNDCP-J572DWDCP-1612WDCP-L3550CDWMFC-J2730DWMFC-L2820DWXLMFC-L5700DNMFC-J738DWNDCP-L2552DNMFC-L6700DWTD-2310DHL-L5228DWDCP-L2665DWDCP-T220MFC-L5728DWDCP-L8410CDWMFC-1915WDCP-L2550DWQL-810WcMFC-L2900DWDCP-L5600DNMFC-J7100CDWHL-J6000DWMFC-J995DW XLDCP-L3520CDWMFC-L3735CDNDCP-J1140DWHL-L2386DWMFC-L2827DWXLHL-L1230WMFC-J4540NDCP-L2535DWRJ-4250WBMFC-L8610CDWHL-J6000CDWHL-L1808WDCP-J914NMFC-J690DWMFC-L2805DWHL-L8360CDWADS-2400NRJ-3035BMFC-J815DW XLHL-L2460DWXLDCP-L5610DNHL-5595DNHMFC-L2732DWMFC-L8390CDWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2620DWHL-L2440DWDCP-J1200WEDCP-L1638WMFC-L9577CDWMFC-1910WDCP-T536DWHL-L9430CDNMFC-EX670WPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-B7638DNDCP-L2520DWRDCP-J577NTD-2130NDCP-L3515CDWDCP-B7648DWHL-L2480DWMFC-L2685DWMFC-1916NWMFC-L2886DWMFC-L2707DWHL-EX415DWDCP-J972NHL-L8245CDWRJ-2150MFC-J6930DWHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L6902DWPT-E550W (for Thailand)MFC-L2861DWMFC-L2720DWRMFC-8540DNTJ-4422TNDCP-1610WRHL-1222WEDCP-T439WQL-1110NWBHL-L2447DWMFC-L9630CDNDCP-L2625DWPT-E850TKW (for UAE)HL-L3220CWEHL-L5102DWMFC-J890DWTD-4520DNPT-P900WcHL-L6415DNHL-L9470CDNMFC-J905NDCP-7090DWMFC-J893NDCP-7190DNDCP-7195DWHL-L2400DWPT-E850TKW (for China)MFC-J5930DWDCP-7189DWHL-L6202DWMFC-B7800DNMFC-J1300DWHL-L6210DWTDCP-L2532DWTJ-4121TNMFC-J6945DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-L5718DNDCP-L2640DNHL-2560DNHL-EX470WMFC-L2730DNMFC-L3780CDWDCP-T735DWHL-L2360DNRHL-L6400DWTMFC-L5912DWHL-5590DNHL-L2370DNRDCP-J987N-BMFC-T4500DWHL-B2100DPT-E850TKW (for Koria)MFC-J739DNHL-L2340DWRMFC-L2730DWMFC-J6959DWMFC-L6710DWMFC-L6970DWMFC-L5710DWDCP-J4140Nbizhub 4000iHL-L2467DWVC-500WDCP-B7558WMFC-J2330DWHL-L3290CDWADS-4700WHL-2569DWMFC-L2827DWMFC-L6900DWMFC-J1500NMFC-J805DWHL-L3270CDWHL-1223WEMFC-1919NWDCP-J528NMFC-J4335DW(XL)MFC-L2770DWHL-L5210DNMFC-T925DWDCP-T820DWTJ-4021TNRHL-L6200DWTTD-4420DNZMFC-L2802DWDCP-B7608WDCP-L2540DNDCP-L2537DWTJ-4005DNMFC-J6555DW XLDCP-J928N-WBMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRMFC-1911WMFC-J6555DWMFC-L3740CDWMFC-L3740CDWEMFC-L2880DWXLTD-4650TNWBRPT-E550W (for China)MFC-J6983CDWMFC-L6915DNMFC-L6950DWHL-J7010CDWHL-L5200DWTHL-1212WRHL-1212WEMFC-J5730DWDCP-T238MFC-1912WRDCP-L5510DWHL-L2460DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNTD-2320DSADCP-L2660DWDCP-J772DWHL-L2315DWHL-2590DNMFC-J6540DWEMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NRJ-2035BMFC-L2980DWDCP-B7530DNDCP-L2551DNDCP-T830DWQL-820NWBHL-B2100DBDCP-B7600DBDCP-B7548WDCP-C421WMFC-L5710DNMFC-L2885DWMFC-L2705DWRJ-3050HL-B2080DWMFC-1910WEHL-L3280CDWMFC-L5755DWMFC-J6940DWDCP-L2540DNRMFC-J998DWNDCP-1615NWMFC-B7810DWTD-4550DNWBHL-L6400DWHL-T4000DWMFC-B7811DWADS-3600WHL-L3295CDWDCP-T710W(for China)DCP-L2560DWRDCP-L2622DWHL-L5212DWTJ-4420TNMFC-L2806DWDCP-J1200W(XL)MFC-T810WDCP-T520WHL-JF1MFC-L6910DNMFC-J895DWMFC-L2701DWTJ-4520TNHL-L3230CDNMFC-J5945DWMFC-L2715DWDCP-J1200NPT-E850TKW (for Vietnum)MFC-J738DNDCP-L2530DWHL-L2405WMFC-J5330DWHL-B2181DWDCP-T225DCP-J1203NADS-4900WHL-L2372DNMFC-L2700DNHL-L8240CDWHL-L8260CDNMFC-J5955DWDCP-L5650DNMFC-J6997CDWMFC-L2710DWHL-L6250DNDCP-7190DWPJ-773MFC-L2740DWDCP-T730DWFAX-L2710DNMFC-J5855DWMFC-J1800DWMFC-L2716DWHL-L5215DNMFC-T935DWADS-2800WHL-L5100DNTMFC-L6900DWGDCP-L3568CDWDCP-B7650DWDCP-L2600DWTJ-4010TNMFC-J4940DNMFC-L2862DWHL-L2464DWMFC-L3710CDWMFC-J6999CDWHL-L2475DWHL-1211WHL-L2370DWXLTD-2350DFMFC-7890DNDCP-T436WMFC-T920DWHL-L8260CDWTD-4420TNDCP-L3520CDWETD-4420DNHL-L2395DWHL-L6418DWHL-L5202DWMFC-J5800CDWHL-L2365DWMFC-T930DWHL-L2365DWRDCP-1617NWMFC-J6947DWQL-820NWBcHL-L8360CDWTMFC-L2922DWDCP-L3517CDWADS-1700WMFC-J6995CDWMFC-L2750DWDCP-L2648DWMFC-L3770CDWMFC-L2700DW(ASA)DCP-T428WHL-1223WRDCP-J973N-W/BFAX-L2800DWMFC-J5630CDWMFC-L3760CDWMFC-L6915DN CSPHL-L2420DWMFC-L2700DWRMFC-L3720CDWMFC-8530DNRJ-3050AiMFC-J739DWNMFC-L9610CDNDCP-J987N-WDCP-L1630WHL-L8230CDWDCP-T510W(for China)DCP-J1800NHL-L2460DNMFC-L2700DWMFC-J1010DWMFC-J7600CDWDCP-L5602DNDCP-T535DWDCP-L2518DWHL-L1238WMFC-J805DW XLRJ-3250WBMFC-L2715DW(for Tiwan, Koria)TJ-4620TNHL-L3220CDWMFC-L2820DWHL-L5215DWDS-740DMFC-1911NWHL-L2376DWDCP-1622WEADS-4300NMFC-J6583CDWDCP-J1050DWHL-1212WHL-L9410CDNMFC-J6935DWDCP-T430WMFC-L3750CDWMFC-J7700CDWDCP-J1800DWDCP-T236MFC-J6535DWMFC-L3745CDWPT-E550W (for Koria)HL-L5050DNMFC-L3768CDWHL-L3230CDWTJ-4120TNMFC-L2835DWMFC-L9570CDWMFC-L2920DWADS-2700WeMFC-L6915DWHL-L5218DNMFC-L2720DNMFC-L3765CDWHL-B2180DWBDCP-B7520DWPT-E800WHL-3160CDWMFC-L2765DWMFC-J5830DWDCP-T510WMFC-L5915DWHL-1210WMFC-L2710DNRMFC-L2740DWRDCP-T720DWMFC-J5855DW XLDCP-L2560DWTD-4650TNWBHL-J6100DWMFC-L2680WDCP-L5502DNDCP-7180DNbizhub 4020iMFC-4340DWETD-2320DFMFC-EX915DWDCP-1623WEMFC-J6540DWMFC-L2703DWPJ-883HL-L2445DWADS-1350WMFC-J998DNHL-L6415DWTMFC-L2760DWADS-2700WDS/MDS-940DWHL-L5210DWPT-E550W (for Tiwan, Hongkong)HL-J6010DWHL-L5212DNDCP-L2508DWDCP-L2628DWMFC-L2720DWHL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-J3540DWDCP-L5662DNTJ-TJ-4522TNTD-2320DDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NHL-5595DNPT-E850TKW (for Tiwan)HL-L3228CDWMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEHL-B2188DWMFC-J4535DW(XL)DCP-L5660DNMFC-L2712DNMFC-L3755CDWMFC-J6740DWMFC-L2960DWMFC-J5740DWMFC-L2807DWDCP-J526NMFC-L2730DWRHL-L2370DNHL-B2180DWHL-L3288CDWMFC-J2740DWPT-E850TKW (for Thailand)HL-L6310DWRJ-2140MFC-EX910DCP-B7600DHL-2595DWMFC-L5902DWMFC-J4440DWFAX-L2700DNMFC-J6980CDWHL-L3210CWMFC-J995DWMFC-L6820DWMFC-J7300CDWDCP-B7640DWMFC-J7500CDWMFC-J5340DWEDCP-L3528CDWDCP-1612WRDCP-L2548DWMFC-J2340DWMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J978N-W/BHL-L6415DN CSPDCP-L2680DWTD-4750TNWBDCP-J587NHL-L6250DWTD-4520TNDCP-L2600DHL-B2050DNSP-1MFC-L6750DWDCP-J1700DWADS-1800WDCP-T725DWTD-2350DSAMFC-L9670CDNDCP-B7628DWDCP-J774DWHL-L5200DWMFC-B7720DNDCP-L5512DNDCP-T425WDCP-T710WDCP-1612WEHL-L2305WMFC-L6720DWDCP-T835DWDCP-L2530DWRADS-3000NMFC-J6957DWPT-P900WADS-4500WDCP-L2550DW(TWN)DCP-J1100DW
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-24049
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 30.62%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 00:00
Updated-29 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management.

Action-Not Available
Vendor-connectizen/aconnectize
Product-ac21000_g6_firmwareac21000_g6n/aac21000_g6_firmware
CWE ID-CWE-1393
Use of Default Password
CWE ID-CWE-521
Weak Password Requirements
CVE-2025-6077
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.57%
||
7 Day CHG+0.01%
Published-02 Aug, 2025 | 02:15
Updated-03 Nov, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-6077

Partner Software's Partner Software Product and corresponding Partner Web application use the same default username and password for the administrator account across all versions.

Action-Not Available
Vendor-Partner Software
Product-Partner Web
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2023-0635
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.72%
||
7 Day CHG+0.03%
Published-05 Jun, 2023 | 03:42
Updated-08 Jan, 2025 | 16:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation to root

Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.

Action-Not Available
Vendor-ABB
Product-nexus-264-amatrix-11_firmwarematrix-264_firmwarematrix-232nexus-2128-g_firmwarenexus-264nexus-2128-aaspect-ent-96nexus-2128-gnexus-264_firmwarenexus-2128_firmwarenexus-2128-fnexus-264-a_firmwarenexus-2128-a_firmwarematrix-216matrix-296_firmwarematrix-216_firmwareaspect-ent-256nexus-3-264_firmwareaspect-ent-12aspect-ent-256_firmwarematrix-11nexus-264-faspect-ent-2_firmwarenexus-264-g_firmwarenexus-264-f_firmwarenexus-2128nexus-3-2128nexus-3-2128_firmwarematrix-232_firmwarenexus-264-gaspect-ent-12_firmwarematrix-296aspect-ent-2nexus-2128-f_firmwarenexus-3-264aspect-ent-96_firmwarematrix-264MATRIX SeriesNEXUS SeriesASPECT®-Enterprise
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2022-50803
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.08% / 22.67%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 22:41
Updated-05 Jan, 2026 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JM-DATA ONU JF511-TV 1.0.67 Default Credentials Vulnerability

JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privileges.

Action-Not Available
Vendor-JM-DATA ONU
Product-JF511-TV
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-54303
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 19.84%
||
7 Day CHG~0.00%
Published-04 Dec, 2025 | 00:00
Updated-16 Dec, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Thermo Fisher Torrent Suite Django application 5.18.1 has weak default credentials, which are stored as fixtures for the Django ORM API. The ionadmin user account can be used to authenticate to default deployments with the password ionadmin. The user guide recommends changing default credentials; however, a password change policy for default administrative accounts is not enforced. Many deployments may retain default credentials, in which case an attacker is likely to be able to successfully authenticate with administrative privileges.

Action-Not Available
Vendor-thermofishern/a
Product-torrent_suite_softwaren/a
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-12286
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.32% / 54.57%
||
7 Day CHG~0.00%
Published-10 Dec, 2024 | 17:40
Updated-11 Dec, 2024 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MOBATIME Network Master Clock has a use of default credentials vulnerability

MOBATIME Network Master Clock - DTS 4801 allows attackers to use SSH to gain initial access using default credentials.

Action-Not Available
Vendor-MOBATIME
Product-Network Master Clock - DTS 4801
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-51536
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 32.78%
||
7 Day CHG+0.01%
Published-04 Aug, 2025 | 00:00
Updated-23 Sep, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered to contain a hardcoded Administrator password.

Action-Not Available
Vendor-crawsn/a
Product-openatlasn/a
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-4126
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-9.6||CRITICAL
EPSS-0.29% / 52.02%
||
7 Day CHG~0.00%
Published-27 Mar, 2023 | 04:46
Updated-19 Feb, 2025 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Default Password

Use of Default Password vulnerability in ABB RCCMD on Windows, Linux, MacOS allows Try Common or Default Usernames and Passwords.This issue affects RCCMD: before 4.40 230207.

Action-Not Available
Vendor-ABBLinux Kernel Organization, IncMicrosoft CorporationApple Inc.
Product-rccmdwindowsmacoslinux_kernelRCCMD
CWE ID-CWE-1393
Use of Default Password
CWE ID-CWE-287
Improper Authentication
CVE-2025-34516
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.18% / 39.14%
||
7 Day CHG~0.00%
Published-16 Oct, 2025 | 17:52
Updated-28 Nov, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ilevia EVE X1 Server 4.7.18.0.eden Use of Default Credentials

Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain a use of default credentials vulnerability that allows an unauthenticated attacker to obtain remote access. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

Action-Not Available
Vendor-ileviaIlevia Srl.
Product-eve_x1_servereve_x1_server_firmwareEVE X1 Server
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-35042
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.3||CRITICAL
EPSS-0.16% / 36.53%
||
7 Day CHG+0.02%
Published-22 Sep, 2025 | 15:57
Updated-19 Dec, 2025 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Airship AI Acropolis default credentials

Airship AI Acropolis includes a default administrative account that uses the same credentials on every installation. Instances of Airship AI that do not change this account password are vulnerable to a remote attacker logging in and gaining the privileges of this account. Fixed in 10.2.35, 11.0.21, and 11.1.9.

Action-Not Available
Vendor-airship.aiAirship AI
Product-acropolisAcropolis
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-35452
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-9.2||CRITICAL
EPSS-0.14% / 34.05%
||
7 Day CHG~0.00%
Published-05 Sep, 2025 | 17:49
Updated-23 Dec, 2025 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pan-Tilt-Zoom cameras default administrative credentials for web interface

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use default, shared credentials for the administrative web interface.

Action-Not Available
Vendor-multicam-systemssmtavvaluehdSMTAVValueHDmultiCAM SystemsPTZOptics
Product-mcamii_ptz_firmwarehd17h-nvx720lpt12x-ndi-xxpt20x-sdi-xx-g2_firmwarevx751bavx61basl_firmwarevx61alpt20x-usb-xx-g2_firmwareba12s_firmwarevx90vx800i2_firmwarebv20sba30-nvx60alpt30x-sdi-xx-g2ba20-n_firmwareba12-n_firmwarev71uvsvx60aslptvl-zcam_firmwareba30-n_firmwarept12x-4k-xx-g3_firmwarebx20n_firmwarept12x-4k-xx-g3pt30x-se-xx-g3pt20x-zcam_firmwarehd17hvx60asl_firmwarebx20uhd-n_firmwarept12x-se-xx-g3_firmwarept30x-ndi-xx_firmwarebv20s_firmwarept20x-se-xx-g3_firmwarehd17h_firmwarevx61asl_firmwarept30x-4k-xx-g3_firmwarevx71uvs_firmwarevx630al_firmwaremcamii_ptzvx701rapt30x-se-xx-g3_firmwarepteptz-zcam-g2_firmwaret20x-ndi-xx_firmwarevl_fixed_camera_firmwarept20x-zcamv60xl_firmwarept20x-4k-xx-g3vx71uvsba30spt-studiopro_firmwarept12x-usb-xx-g2pt30x-link-4k-xxba20spt30x-ndi-xxv61wvx61baslvx90_firmwarevx701ta_firmwarept20x-usb-xx-g2bv30s_firmwarepteptz-ndi-zcam-g2vx701tavx751ba_firmwaret20x-ndi-xxvx60al_firmwarev63xl_firmwarept12x-se-xx-g3v71uvs_firmwarevx70uvspt30x-4k-xx-g3pt12x-sdi-xx-g2_firmwareptvl-zcamvx752avx800i2vx61al_firmwarev63xlv61w_firmwarept30x-sdi-xx-g2_firmwarept30x-link-4k-xx_firmwarept12x-usb-xx-g2_firmwarept20x-4k-xx-g3_firmwareba20s_firmwarept20x-link-4k-xx_firmwarepteptz-zcam-g2vx752ag_firmwarevx61aslpt12x-link-4k-xx_firmwarebv30spt20x-se-xx-g3pt12x-ndi-xx_firmwarevl_fixed_cameravx70uvs_firmwareba12spt12x-zcam_firmwareba20-nbx20uhd-nvx752a_firmwarebx20s-shvx701ra_firmwarept-studioprondi_fixed_camerabx20s-sh_firmwarev60xlbx20uhdpt20x-sdi-xx-g2pt12x-zcambx30s_firmwarevx752agvx630alpt12x-link-4k-xxbx30sba30s_firmwareba12-nvx720l_firmwarehd17h-n_firmwarebx20uhd_firmwarept12x-sdi-xx-g2ndi_fixed_camera_firmwarebx20npt20x-link-4k-xxPT30X-4K-xx-G3PT-STUDIOPROPT20X-SDI/NDI-xxPT30X-LINK-4K-xxPT20X-USB-xxPT12X-STUDIO-4K-xx-G3PT12X-SDI/NDI-xxVL Fixed Camera/NDI Fixed CameraHC-EPTZ-NDIPT20X-STUDIO-4K-xx-G3PT12X-USB-xxPT30X-SE-xx-G3PT20X-4K-xx-G3PT20X-SE-xx-G3PT20X-LINK-4K-xxPT30X-SDI/NDI-xx20x Fixed Camera/NDI Fixed CameraEPTZ Fixed Camera/NDI Fixed CameraPan-Tilt-Zoom CamerasPT12X-SE-xx-G312x Fixed Camera/NDI Fixed CameraPT12X-LINK-4K-xxPT12X-4K-xx-G3
CWE ID-CWE-1392
Use of Default Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-30139
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.30%
||
7 Day CHG~0.00%
Published-18 Mar, 2025 | 00:00
Updated-01 Jul, 2025 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted.

Action-Not Available
Vendor-gnetsystemn/a
Product-g-onx_firmwareg-onxn/a
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-30519
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.06% / 18.42%
||
7 Day CHG+0.01%
Published-18 Sep, 2025 | 20:46
Updated-19 Sep, 2025 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dover Fueling Solutions ProGauge MagLink LX4 Devices Use of Weak Credentials

Dover Fueling Solutions ProGauge MagLink LX4 Devices have default root credentials that cannot be changed through standard administrative means. An attacker with network access to the device can gain administrative access to the system.

Action-Not Available
Vendor-Dover Fueling Solutions
Product-ProGauge MagLink LX PlusProGauge MagLink LX 4ProGauge MagLink LX Ultimate
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-27690
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 65.29%
||
7 Day CHG+0.01%
Published-10 Apr, 2025 | 02:04
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.0, contains a use of default password vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the takeover of a high privileged user account.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-1393
Use of Default Password
CVE-2025-22938
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.72%
||
7 Day CHG~0.00%
Published-31 Mar, 2025 | 00:00
Updated-18 Aug, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adtran 411 ONT L80.00.0011.M2 was discovered to contain weak default passwords.

Action-Not Available
Vendor-n/aAdtran, Inc
Product-411411_firmwaren/a
CWE ID-CWE-1393
Use of Default Password
CVE-2024-50588
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
ShareView Details
Matching Score-4
Assigner-SEC Consult Vulnerability Lab
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.54%
||
7 Day CHG~0.00%
Published-08 Nov, 2024 | 08:37
Updated-03 Nov, 2025 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unprotected Exposed Firebird Database with default credentials

An unauthenticated attacker with access to the local network of the medical office can use known default credentials to gain remote DBA access to the Elefant Firebird database. The data in the database includes patient data and login credentials among other sensitive data. In addition, this enables an attacker to create and overwrite arbitrary files on the server filesystem with the rights of the Firebird database ("NT AUTHORITY\SYSTEM").

Action-Not Available
Vendor-HASOMEDhasomed
Product-Elefantelefant
CWE ID-CWE-1393
Use of Default Password
CWE ID-CWE-419
Unprotected Primary Channel
CVE-2024-43698
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-0.14% / 34.16%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 21:23
Updated-23 Oct, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kieback&Peter DDC4000 Series Use of Weak Credentials

Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.

Action-Not Available
Vendor-Kieback&Peterkieback\&peter
Product-DDC4400eDDC4002DDC4100DDC4400DDC4200-LDDC4040eDDC4020eDDC4200eDDC4200DDC4002eddc4200e_firmwareddc4002e_firmwareddc4100_firmwareddc4400e_firmwareddc4200_firmwareddc4400_firmwareddc4040e_firmwareddc4002_firmwareddc4020e_firmwareddc4200-l_firmware
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2024-39747
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-0.08% / 23.91%
||
7 Day CHG~0.00%
Published-31 Aug, 2024 | 01:01
Updated-16 Sep, 2024 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Sterling Connect:Direct Web Services information disclosure

IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 uses default credentials for potentially critical functionality.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-aixsterling_connect_direct_web_serviceswindowslinux_kernelSterling Connect:Direct Web Services
CWE ID-CWE-1392
Use of Default Credentials
CVE-2026-27751
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.08%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 18:07
Updated-02 Mar, 2026 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SODOLA SL902-SWTGW124AS <= 200.1.20 Use of Default Credentials

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.

Action-Not Available
Vendor-Shenzhen Hongyavision Technology Co., Ltd. (Sodola Networks)
Product-SODOLA SL902-SWTGW124AS
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-30802
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.46%
||
7 Day CHG~0.00%
Published-10 May, 2024 | 00:00
Updated-18 Nov, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Vehicle Management System 7.31.0.3_20230412 allows an attacker to escalate privileges via the login.html component.

Action-Not Available
Vendor-n/ag-sky
Product-n/avehicle_management_system
CWE ID-CWE-1393
Use of Default Password
CVE-2026-24429
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.11% / 30.06%
||
7 Day CHG+0.01%
Published-26 Jan, 2026 | 17:39
Updated-29 Jan, 2026 | 13:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tenda W30E V2 Hardcoded Default Password for Built-in Account

Shenzhen Tenda W30E V2 firmware versions up to and including V16.01.0.19(5037) ship with a predefined default password for a built-in authentication account that is not required to be changed during initial configuration. An attacker can leverage these default credentials to gain authenticated access to the management interface.

Action-Not Available
Vendor-Shenzhen Tenda Technology Co., Ltd.Tenda Technology Co., Ltd.
Product-w30ew30e_firmwareW30E V2
CWE ID-CWE-1393
Use of Default Password
CVE-2024-29666
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.78%
||
7 Day CHG~0.00%
Published-25 Mar, 2024 | 00:00
Updated-27 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in Vehicle Monitoring platform system CMSV6 v.7.31.0.2 through v.7.32.0.3 allows a remote attacker to escalate privileges via the default password component.

Action-Not Available
Vendor-n/atongtianxing_technology_co_ltd
Product-n/acmsv6
CWE ID-CWE-1393
Use of Default Password
CVE-2024-29844
Matching Score-4
Assigner-DirectCyber
ShareView Details
Matching Score-4
Assigner-DirectCyber
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 25.46%
||
7 Day CHG~0.00%
Published-14 Apr, 2024 | 23:48
Updated-10 Dec, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Default credentials on web interface of Evolution Controller Versions allows attackers to login and perform administrative functions

Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.

Action-Not Available
Vendor-cs-technologiesCS Technologies Australiacs_technologies
Product-evolutionEvolution Controllerevolution_controller
CWE ID-CWE-1392
Use of Default Credentials
CVE-2024-12728
Matching Score-4
Assigner-Sophos Limited
ShareView Details
Matching Score-4
Assigner-Sophos Limited
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.53%
||
7 Day CHG~0.00%
Published-19 Dec, 2024 | 20:48
Updated-12 Nov, 2025 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3 (20.0.3).

Action-Not Available
Vendor-Sophos Ltd.
Product-firewallfirewall_firmwareSophos Firewall
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-11943
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.10% / 26.49%
||
7 Day CHG~0.00%
Published-19 Oct, 2025 | 19:32
Updated-17 Nov, 2025 | 12:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
70mai X200 HTTP Web Server default credentials

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-70mai70mai
Product-x200_firmwarex200X200
CWE ID-CWE-1392
Use of Default Credentials
CVE-2025-1160
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.21% / 43.87%
||
7 Day CHG~0.00%
Published-10 Feb, 2025 | 22:31
Updated-03 Mar, 2025 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Employee Management System index.php default credentials

A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument username/password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-remyandradeSourceCodester
Product-employee_management_systemEmployee Management System
CWE ID-CWE-1392
Use of Default Credentials
  • Previous
  • 1
  • 2
  • Next
Details not found