CVE-2025-10880
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-25

Last updated on: 2025-09-29

Assigner: ICS-CERT

Description
All versions of Dingtian DT-R002 are vulnerable to an Insufficiently Protected Credentials vulnerability that could allow an attacker to extract the proprietary "Dingtian Binary" protocol password by sending an unauthenticated GET request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-25
Last Modified
2025-09-29
Generated
2026-05-07
AI Q&A
2025-09-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
dingtian-tech dt-r002_firmware *
dingtian-tech dt-r002 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects all versions of Dingtian DT-R002 and is an Insufficiently Protected Credentials issue. It allows an attacker to extract the proprietary "Dingtian Binary" protocol password by sending an unauthenticated GET request, meaning no authentication is required to exploit this flaw.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can obtain the proprietary protocol password without authentication, potentially leading to unauthorized access to the device or its communications. This could compromise the security and integrity of systems relying on the Dingtian DT-R002 device.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart