CVE-2025-9589
BaseFortify
Publication date: 2025-08-28
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cudy | wr1200ea | 2.3.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1393 | The product uses default passwords for potentially critical functionality. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Cudy WR1200EA device version 2.3.7-20250113-121810, specifically related to an unknown function involving the /etc/shadow file. An attacker with local access can manipulate the system to cause it to use a default password. The attack is complex and difficult to exploit, but the exploit has been publicly disclosed and may be used.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with local access to bypass normal authentication by causing the system to use a default password. This could lead to unauthorized access to the device or system, potentially compromising security.