Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Until a firmware patch is made available by the vendor, users are advised to disconnect the dongle from their local network and limit its use strictly to Access Point functionality to minimize the attack surface
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
|
| Vendors & Products |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
Wed, 10 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hard-coded cryptographic keys in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI | |
| Title | Hard-coded cryptographic keys in EZCast Pro II Dongle | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-12-10T15:04:05.435Z
Reserved: 2025-12-03T13:26:03.328Z
Link: CVE-2025-13954
Updated: 2025-12-10T15:04:01.189Z
Status : Awaiting Analysis
Published: 2025-12-10T09:15:46.067
Modified: 2025-12-12T15:18:42.140
Link: CVE-2025-13954
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:48:45Z