Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14263 | A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 10 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Continew
Continew continew Admin |
|
| CPEs | cpe:2.3:a:continew:continew_admin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Continew
Continew continew Admin |
Mon, 12 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 11 May 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | ContiNew Admin password unverified password change | |
| Weaknesses | CWE-620 CWE-640 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-05-12T15:05:41.241Z
Reserved: 2025-05-10T15:45:14.197Z
Link: CVE-2025-4552
Updated: 2025-05-12T15:05:37.890Z
Status : Analyzed
Published: 2025-05-12T00:15:16.450
Modified: 2025-11-10T15:00:19.957
Link: CVE-2025-4552
No data.
OpenCVE Enrichment
No data.
EUVD