CVE-2025-13955
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-10
Assigner: Switzerland Government Common Vulnerability Program
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ezcast | pro_ii | 1.17478.146 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-330 | The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a predictable default Wi-Fi password in the Access Point functionality of EZCast Pro II version 1.17478.146. Attackers within Wi-Fi range can calculate the default password by using observable device identifiers, allowing them to gain unauthorized access to the dongle.
How can this vulnerability impact me? :
An attacker within Wi-Fi range can gain unauthorized access to the EZCast Pro II dongle by calculating its default Wi-Fi password. This can lead to unauthorized use or control of the device, potential data interception, or further network compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying EZCast Pro II dongles operating in Access Point mode within your Wi-Fi range and checking if they use the predictable default Wi-Fi password. Since the password is derived from observable device identifiers, monitoring Wi-Fi networks for SSIDs or devices matching EZCast Pro II dongles and attempting to calculate or test the default password can help detect vulnerable devices. Specific commands are not provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disconnecting the EZCast Pro II dongle from local networks, restricting its use to Access Point mode only, and changing the default Wi-Fi password to a non-predictable one. Since no firmware patch is currently available, these measures reduce the attack surface and help prevent unauthorized access. [1]