The ITEL ISO FM SFN Adapter (firmware ISO2 2.0.0.0, WebServer 2.0) is vulnerable to session hijacking due to improper session management on the /home.html endpoint. An attacker can access an active session without authentication, allowing them to control the device, modify configurations, and compromise system integrity.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Description The ITEL ISO FM SFN Adapter (firmware ISO2 2.0.0.0, WebServer 2.0) is vulnerable to session hijacking due to improper session management on the /home.html endpoint. An attacker can access an active session without authentication, allowing them to control the device, modify configurations, and compromise system integrity.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-19T21:36:02.845Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63219

cve-icon Vulnrichment

Updated: 2025-11-19T15:47:56.148Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T15:15:50.600

Modified: 2025-11-19T22:16:04.160

Link: CVE-2025-63219

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.