The 2wcom IP-4c 2.15.5 device suffers from a Broken Access Control vulnerability. Certain sensitive endpoints are intended to be accessible only after the admin explicitly grants access to a manager-level account. However, a manager-level user can bypass these controls by intercepting and modifying requests.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 22 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-285
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 17:45:00 +0000

Type Values Removed Values Added
Description The 2wcom IP-4c 2.15.5 device suffers from a Broken Access Control vulnerability. Certain sensitive endpoints are intended to be accessible only after the admin explicitly grants access to a manager-level account. However, a manager-level user can bypass these controls by intercepting and modifying requests.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-22T17:46:09.147Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57438

cve-icon Vulnrichment

Updated: 2025-09-22T17:45:37.616Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-22T18:15:45.357

Modified: 2025-09-22T21:22:33.590

Link: CVE-2025-57438

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.