CVE-2025-36754
BaseFortify
Publication date: 2025-12-13
Last updated on: 2025-12-15
Assigner: Dutch Institute for Vulnerability Disclosure
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to an improperly implemented authentication mechanism on a web interface. An attacker can bypass authentication checks by crafting a POST request with new settings because there is no session token or authentication in place. This allows unauthorized changes to the device's configuration, such as pointing it to an arbitrary address for domain name resolution.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to redirect the device's domain name resolution to an arbitrary address, which can facilitate a man-in-the-middle (MitM) attack. This could lead to interception or manipulation of network traffic, potentially compromising sensitive information or network integrity.