Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-15587
PUBLISHED
More InfoOfficial Page
Assigner-CERT-PL
Assigner Org ID-4bb8329e-dd38-46c1-aafb-9bf32bcb93c6
View Known Exploited Vulnerability (KEV) details
Published At-16 Mar, 2026 | 09:26
Updated At-16 Mar, 2026 | 16:26
Rejected At-
▼CVE Numbering Authority (CNA)
Credentials exposure in tinycontrol devices

Tinycontrol devices such as tcPDU and LAN Controllers LK3.5, LK3.9 and LK4 allow a low privileged user to read an administrator's password by directly accessing a specific resource inaccessible via a graphical interface. This issue has been fixed in firmware versions: 1.36 (for tcPDU), 1.67 (for LK3.5 - hardware versions: 3.5, 3.6, 3.7 and 3.8), 1.75 (for LK3.9 - hardware version 3.9) and 1.38 (for LK4 - hardware version 4.0).

Affected Products
Vendor
tinycontrol
Product
Lan Kontroler v3.5
Default Status
unaffected
Versions
Affected
  • From 0 before 1.67 (semver)
Vendor
tinycontrol
Product
LK3.9
Default Status
unaffected
Versions
Affected
  • From 0 before 1.75 (semver)
Vendor
tinycontrol
Product
LK4
Default Status
unaffected
Versions
Affected
  • From 0 before 1.38 (semver)
Vendor
tinycontrol
Product
tcPDU
Default Status
unaffected
Versions
Affected
  • From 0 before 1.36 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-425CWE-425 Direct Request ('Forced Browsing')
Type: CWE
CWE ID: CWE-425
Description: CWE-425 Direct Request ('Forced Browsing')
Metrics
VersionBase scoreBase severityVector
4.08.6HIGH
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.pl/en/posts/2026/03/CVE-2025-11500/
third-party-advisory
https://tinycontrol.pl/en/archives/lan-controller-35/downloads/#firmware
release-notes
https://tinycontrol.pl/en/lk39/downloads/#firmware
release-notes
https://tinycontrol.pl/en/lk4/downloads/#firmware
release-notes
https://tinycontrol.pl/en/tcpdu/downloads/#firmware
release-notes
Hyperlink: https://cert.pl/en/posts/2026/03/CVE-2025-11500/
Resource:
third-party-advisory
Hyperlink: https://tinycontrol.pl/en/archives/lan-controller-35/downloads/#firmware
Resource:
release-notes
Hyperlink: https://tinycontrol.pl/en/lk39/downloads/#firmware
Resource:
release-notes
Hyperlink: https://tinycontrol.pl/en/lk4/downloads/#firmware
Resource:
release-notes
Hyperlink: https://tinycontrol.pl/en/tcpdu/downloads/#firmware
Resource:
release-notes
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found