CVE-2026-24346
BaseFortify
Publication date: 2026-01-27
Last updated on: 2026-02-05
Assigner: Switzerland Government Common Vulnerability Program
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nimbletech | ezcast_pro_dongle_ii_firmware | 1.17478.146 |
| nimbletech | ezcast_pro_dongle_ii | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of well-known default credentials in the Admin UI of the EZCast Pro II device. Because the default credentials are widely known and unchanged, attackers can gain unauthorized access to protected areas within the device's web application, potentially compromising the device's security. [1]
How can this vulnerability impact me? :
The vulnerability can allow attackers to access protected administrative areas of the EZCast Pro II device without authorization. This unauthorized access could lead to misuse or manipulation of the device, potentially compromising network security or device functionality. Since no patches are available, mitigation involves disconnecting the device from the local network, limiting its use to access point functionality, and changing default passwords. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve checking for devices running EZCast Pro II and attempting to access the Admin UI using well-known default credentials. Since no specific technical details or detection commands have been publicly disclosed, a practical approach is to scan your network for EZCast Pro II devices and verify if default credentials are still in use by attempting login. Network scanning tools like nmap can be used to identify devices, but no exact commands are provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disconnecting the EZCast Pro II dongle from the local network, restricting its use strictly to access point functionality to reduce the attack surface, and changing the default password to a strong, unique password. These steps are recommended due to the lack of available patches from the vendor. [1]