Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Until a firmware patch is made available by the vendor, all users are advised to change the default password in the management UI.

History

Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware
Vendors & Products Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware

Wed, 10 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 08:45:00 +0000

Type Values Removed Values Added
Description Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers
Title Predictable Default Wi-Fi Password in EZCast Pro II Dongle
Weaknesses CWE-330
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/AU:Y/RE:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2025-12-10T14:52:44.905Z

Reserved: 2025-12-03T13:26:04.173Z

Link: CVE-2025-13955

cve-icon Vulnrichment

Updated: 2025-12-10T14:52:40.662Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-10T09:15:46.710

Modified: 2025-12-12T15:18:42.140

Link: CVE-2025-13955

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-10T17:48:48Z

Weaknesses