Vulnerabilities
Vulnerable Software
The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.
CVSS Score
3.7
EPSS Score
0.0
Published
2026-01-15
An attacker with limited permissions may still be able to write files to specific locations on the device, potentially leading to system manipulation.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker with low privileges may be able to read files from specific directories on the device, potentially exposing sensitive information.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker with low privileges may be able to trigger critical system functions such as reboot or factory reset without proper restrictions, potentially leading to service disruption or loss of configuration.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
An attacker may exploit missing protection against clickjacking by tricking users into performing unintended actions through maliciously crafted web pages, leading to the extraction of sensitive data.
CVSS Score
4.3
EPSS Score
0.0
Published
2026-01-15
Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.
CVSS Score
7.5
EPSS Score
0.0
Published
2026-01-15
The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.
CVSS Score
7.5
EPSS Score
0.0
Published
2026-01-15
Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.
CVSS Score
5.3
EPSS Score
0.0
Published
2026-01-15


Contact Us

Shodan ® - All rights reserved