Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Nexxt Solutions

Source -

CNA

BOS Name -

N/A

CNA CVEs -

6

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated ProductsRelated AssignersReports
6Vulnerabilities found

CVE-2026-31851
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-7.7||HIGH
EPSS-0.08% / 22.65%
||
7 Day CHG-0.01%
Published-23 Mar, 2026 | 12:21
Updated-29 Apr, 2026 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of Rate Limiting Enables Brute-Force Attacks in Nexxt Nebula 300+

Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement rate limiting or account lockout mechanisms on authentication interfaces. An attacker can perform unlimited authentication attempts against endpoints that rely on credential validation, enabling brute-force attacks to guess administrative credentials without restriction.

Action-Not Available
Vendor-nexxtsolutionsNexxt Solutions
Product-nebula300plus_firmwarenebula300plusNebula 300+
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2026-31850
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 6.55%
||
7 Day CHG-0.00%
Published-23 Mar, 2026 | 12:21
Updated-29 Apr, 2026 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Plaintext Storage of Credentials in Configuration Backup in Nexxt Nebula 300+

Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 stores sensitive information, including administrative credentials and WiFi pre-shared keys, in plaintext within exported configuration backup files. These backup files can be obtained through legitimate functionality or other weaknesses and do not apply encryption or hashing, allowing attackers to directly extract sensitive information.

Action-Not Available
Vendor-nexxtsolutionsNexxt Solutions
Product-nebula300plus_firmwarenebula300plusNebula 300+
CWE ID-CWE-256
Plaintext Storage of a Password
CVE-2026-31849
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-7.2||HIGH
EPSS-0.02% / 4.30%
||
7 Day CHG~0.00%
Published-23 Mar, 2026 | 12:16
Updated-29 Apr, 2026 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing CSRF Protection on Administrative Endpoints in Nexxt Nebula 300+

Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement CSRF protections on state-changing endpoints such as /goform/setSysTools and other administrative interfaces. As a result, an attacker can craft malicious web requests that are executed in the context of an authenticated administrator’s browser, leading to unauthorized configuration changes, including enabling services or modifying system settings.

Action-Not Available
Vendor-nexxtsolutionsNexxt Solutions
Product-nebula300plus_firmwarenebula300plusNebula 300+
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2026-31848
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-8.7||HIGH
EPSS-0.04% / 12.09%
||
7 Day CHG-0.02%
Published-23 Mar, 2026 | 12:09
Updated-29 Apr, 2026 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reversible ecos_pw Cookie Allows Authentication Bypass in Nexxt Nebula 300+

Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 uses the ecos_pw cookie for authentication, which contains Base64-encoded credential data combined with a static suffix. Because the encoding is reversible and lacks integrity protection, an attacker can reconstruct or forge a valid cookie value without proper authentication. This allows unauthorized administrative access to protected endpoints.

Action-Not Available
Vendor-nexxtsolutionsNexxt Solutions
Product-nebula300plus_firmwarenebula300plusNebula 300+
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2026-31847
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-8.5||HIGH
EPSS-0.09% / 25.14%
||
7 Day CHG-0.02%
Published-23 Mar, 2026 | 12:07
Updated-29 Apr, 2026 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hidden Functionality Enables Remote Telnet Activation via /goform/setSysTools in Nexxt Nebula 300+

Hidden functionality in the /goform/setSysTools endpoint in Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 allows remote enablement of a Telnet service. By sending a crafted POST request with parameters such as telnetManageEn=true and telnetPwd, an authenticated attacker can activate a Telnet service on port 23. This exposes a privileged diagnostic interface that is not intended for external access and can be used to interact with the underlying system.

Action-Not Available
Vendor-nexxtsolutionsNexxt Solutions
Product-nebula300plus_firmwarenebula300plusNebula 300+
CWE ID-CWE-912
Hidden Functionality
CVE-2026-31846
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
ShareView Details
Assigner-309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
CVSS Score-7.1||HIGH
EPSS-0.05% / 16.25%
||
7 Day CHG-0.02%
Published-23 Mar, 2026 | 12:00
Updated-26 Mar, 2026 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Credential Disclosure via /goform/ate in Nexxt Nebula 300+

Missing authentication in the /goform/ate endpoint in Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 allows an adjacent unauthenticated attacker to retrieve sensitive device information, including the administrator password. The endpoint returns a raw response containing parameters such as Login_PW, which is Base64-encoded. An attacker can decode this value to obtain valid administrative credentials and authenticate to the device.

Action-Not Available
Vendor-Nexxt Solutions
Product-Nebula 300+ / Tenda F3 V2.0 Firmware
CWE ID-CWE-306
Missing Authentication for Critical Function