The equipment initially can be configured using the...
Critical severity
Unreviewed
Published
Oct 31, 2025
to the GitHub Advisory Database
•
Updated Nov 3, 2025
Description
Published by the National Vulnerability Database
Oct 31, 2025
Published to the GitHub Advisory Database
Oct 31, 2025
Last updated
Nov 3, 2025
The equipment initially can be configured using the manufacturer's application, by Wi-Fi, by the web server or with the manufacturer’s software.
Using the manufacturer's software, the device can be configured via UDP. Analyzing this communication, it has been observed that any aspect of the initial configuration can be changed by means of the device's MAC without the need for authentication.
References