The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://csirt.divd.nl/CVE-2025-36754/ |
|
History
Sat, 13 Dec 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack. | |
| Title | Authentication bypass on web interface | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: DIVD
Published:
Updated: 2025-12-13T08:16:24.266Z
Reserved: 2025-04-15T21:54:36.815Z
Link: CVE-2025-36754
No data.
Status : Received
Published: 2025-12-13T16:16:54.570
Modified: 2025-12-13T16:16:54.570
Link: CVE-2025-36754
No data.
OpenCVE Enrichment
No data.
Weaknesses