CVE-2025-36754
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-13

Last updated on: 2025-12-15

Assigner: Dutch Institute for Vulnerability Disclosure

Description
The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-13
Last Modified
2025-12-15
Generated
2026-05-07
AI Q&A
2025-12-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-290 This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is due to an improperly implemented authentication mechanism on a web interface. An attacker can bypass authentication checks by crafting a POST request with new settings because there is no session token or authentication in place. This allows unauthorized changes to the device's configuration, such as pointing it to an arbitrary address for domain name resolution.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to redirect the device's domain name resolution to an arbitrary address, which can facilitate a man-in-the-middle (MitM) attack. This could lead to interception or manipulation of network traffic, potentially compromising sensitive information or network integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart