No analysis available yet.
Vendor Workaround
Until a firmware patch is made available by the vendor, all users are advised to change the default password in the management UI.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
|
| Vendors & Products |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
Wed, 10 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers | |
| Title | Predictable Default Wi-Fi Password in EZCast Pro II Dongle | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-12-10T14:52:44.905Z
Reserved: 2025-12-03T13:26:04.173Z
Link: CVE-2025-13955
Updated: 2025-12-10T14:52:40.662Z
Status : Awaiting Analysis
Published: 2025-12-10T09:15:46.710
Modified: 2025-12-12T15:18:42.140
Link: CVE-2025-13955
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:48:48Z