CVE-2025-11942
BaseFortify
Publication date: 2025-10-19
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 70mai | x200_firmware | to 2025-10-10 (inc) |
| 70mai | x200 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the 70mai X200 device's Pairing component, where an unknown function fails to enforce authentication. This missing authentication flaw allows remote attackers to bypass authentication and gain unauthorized access to the device. The exploit is publicly available and can be launched remotely without any user interaction or privileges. [2]
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to unauthorized remote access to the device, compromising its confidentiality, integrity, and availability. Attackers can manipulate the device without authentication, potentially causing resource exhaustion or other malicious actions. Since the vulnerability is remotely exploitable and publicly known, it poses a high risk to affected devices. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be performed by monitoring network traffic for unauthorized pairing attempts to the 70mai X200 device, as the vulnerability allows remote attackers to bypass authentication on the pairing function. Since a proof-of-concept exploit is publicly available on GitHub, you can use it to test if your device is vulnerable. Specific commands are not provided in the resources, but using network scanning tools to detect unusual pairing requests or attempts to access the pairing component remotely is recommended. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying restrictive firewall rules to block unauthorized remote access to the 70mai X200 device, especially blocking access to the pairing component remotely. Since no vendor patches or active countermeasures are currently available, network-level restrictions are the primary defense to prevent exploitation. [2]