Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.

Project Subscriptions

Vendors Products
Contec-touch Subscribe
Smart Home Firmware Subscribe
Smart Home Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Contec-touch
Contec-touch smart Home Firmware
CPEs cpe:2.3:o:contec-touch:smart_home_firmware:1.1:*:*:*:*:*:*:*
Vendors & Products Contec-touch
Contec-touch smart Home Firmware

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Thrive
Thrive smart Home
Vendors & Products Thrive
Thrive smart Home

Fri, 13 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.
Title Thrive Smart Home 1.1 - 'Smart Home' Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-05T01:26:07.296Z

Reserved: 2026-02-12T14:37:15.296Z

Link: CVE-2019-25325

cve-icon Vulnrichment

Updated: 2026-02-13T15:41:51.633Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-12T23:16:04.413

Modified: 2026-02-13T14:23:48.007

Link: CVE-2019-25325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:29:09Z

Weaknesses