CVE-2025-13955
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-10

Assigner: Switzerland Government Common Vulnerability Program

Description
Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-10
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ezcast pro_ii 1.17478.146
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-330 The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a predictable default Wi-Fi password in the Access Point functionality of EZCast Pro II version 1.17478.146. Attackers within Wi-Fi range can calculate the default password by using observable device identifiers, allowing them to gain unauthorized access to the dongle.


How can this vulnerability impact me? :

An attacker within Wi-Fi range can gain unauthorized access to the EZCast Pro II dongle by calculating its default Wi-Fi password. This can lead to unauthorized use or control of the device, potential data interception, or further network compromise.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying EZCast Pro II dongles operating in Access Point mode within your Wi-Fi range and checking if they use the predictable default Wi-Fi password. Since the password is derived from observable device identifiers, monitoring Wi-Fi networks for SSIDs or devices matching EZCast Pro II dongles and attempting to calculate or test the default password can help detect vulnerable devices. Specific commands are not provided in the available resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disconnecting the EZCast Pro II dongle from local networks, restricting its use to Access Point mode only, and changing the default Wi-Fi password to a non-predictable one. Since no firmware patch is currently available, these measures reduce the attack surface and help prevent unauthorized access. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart