CVE-2026-24346
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-27

Last updated on: 2026-02-05

Assigner: Switzerland Government Common Vulnerability Program

Description
Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to access protected areas in the web application
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-27
Last Modified
2026-02-05
Generated
2026-05-07
AI Q&A
2026-01-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nimbletech ezcast_pro_dongle_ii_firmware 1.17478.146
nimbletech ezcast_pro_dongle_ii *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-798 The product contains hard-coded credentials, such as a password or cryptographic key.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the use of well-known default credentials in the Admin UI of the EZCast Pro II device. Because the default credentials are widely known and unchanged, attackers can gain unauthorized access to protected areas within the device's web application, potentially compromising the device's security. [1]


How can this vulnerability impact me? :

The vulnerability can allow attackers to access protected administrative areas of the EZCast Pro II device without authorization. This unauthorized access could lead to misuse or manipulation of the device, potentially compromising network security or device functionality. Since no patches are available, mitigation involves disconnecting the device from the local network, limiting its use to access point functionality, and changing default passwords. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve checking for devices running EZCast Pro II and attempting to access the Admin UI using well-known default credentials. Since no specific technical details or detection commands have been publicly disclosed, a practical approach is to scan your network for EZCast Pro II devices and verify if default credentials are still in use by attempting login. Network scanning tools like nmap can be used to identify devices, but no exact commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disconnecting the EZCast Pro II dongle from the local network, restricting its use strictly to access point functionality to reduce the attack surface, and changing the default password to a strong, unique password. These steps are recommended due to the lack of available patches from the vendor. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart