Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Until a firmware patch is made available by the vendor, all users are advised to change the default password in the management UI.
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
|
| Vendors & Products |
Actions-micro
Actions-micro ezcast Pro Ii Actions-micro ezcast Pro Ii Firmware |
Wed, 10 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers | |
| Title | Predictable Default Wi-Fi Password in EZCast Pro II Dongle | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2025-12-10T14:52:44.905Z
Reserved: 2025-12-03T13:26:04.173Z
Link: CVE-2025-13955
Updated: 2025-12-10T14:52:40.662Z
Status : Awaiting Analysis
Published: 2025-12-10T09:15:46.710
Modified: 2025-12-12T15:18:42.140
Link: CVE-2025-13955
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:48:48Z