Filtered by vendor 2wcom
Subscriptions
Filtered by product Ip-4c
Subscriptions
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-57433 | 1 2wcom | 1 Ip-4c | 2025-09-23 | 6.5 Medium |
The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device. | ||||
CVE-2025-57438 | 1 2wcom | 1 Ip-4c | 2025-09-23 | 6.8 Medium |
The 2wcom IP-4c 2.15.5 device suffers from a Broken Access Control vulnerability. Certain sensitive endpoints are intended to be accessible only after the admin explicitly grants access to a manager-level account. However, a manager-level user can bypass these controls by intercepting and modifying requests. | ||||
CVE-2025-43953 | 1 2wcom | 1 Ip-4c | 2025-09-23 | 8.8 High |
In 2wcom IP-4c 2.16, the web interface allows admin and manager users to execute arbitrary code as root via a ping or traceroute field on the TCP/IP screen. |
Page 1 of 1.