Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to transmission of authentication credentials in plaintext over the network. A remote attacker could exploit this vulnerability by eavesdropping on the victim’s network traffic to extract username and password from the web interface (Password Reset Page) of the vulnerable targeted system.
Published: 2024-01-17
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to latest version 4.1.1.25 or later.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-56438 This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to transmission of authentication credentials in plaintext over the network. A remote attacker could exploit this vulnerability by eavesdropping on the victim’s network traffic to extract username and password from the web interface (Password Reset Page) of the vulnerable targeted system.
History

Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Skyworthdigital Cm5100 Cm5100 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-06-17T21:19:18.410Z

Reserved: 2023-12-22T09:53:53.228Z

Link: CVE-2023-51741

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:34.343Z

cve-icon NVD

Status : Modified

Published: 2024-01-17T08:15:38.223

Modified: 2024-11-21T08:38:42.820

Link: CVE-2023-51741

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses