This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to transmission of authentication credentials in plaintext over the network. A remote attacker could exploit this vulnerability by eavesdropping on the victim’s network traffic to extract username and password from the web interface (Password Reset Page) of the vulnerable targeted system.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-56438 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to transmission of authentication credentials in plaintext over the network. A remote attacker could exploit this vulnerability by eavesdropping on the victim’s network traffic to extract username and password from the web interface (Password Reset Page) of the vulnerable targeted system. |
Fixes
Solution
Upgrade to latest version 4.1.1.25 or later.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Jun 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-06-17T21:19:18.410Z
Reserved: 2023-12-22T09:53:53.228Z
Link: CVE-2023-51741

Updated: 2024-08-02T22:40:34.343Z

Status : Modified
Published: 2024-01-17T08:15:38.223
Modified: 2024-11-21T08:38:42.820
Link: CVE-2023-51741

No data.

No data.