Description
A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-03
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Default SSH Credentials
Action: Immediate Patch
AI Analysis

Impact

The ZHOME A0101 Dropbear SSH Service contains an unknown flaw that lets an attacker use the device’s default credentials. It is inferred that once authenticated, the attacker could gain unrestricted remote command execution on the device, based on the nature of the default credential issue. The weakness is categorized as accidental exposure of default authentication information (CWE-1392) and carries a CVSS score of 9.2, indicating severe impact on confidentiality, integrity, and availability.

Affected Systems

Ziroom ZHOME A0101 version 1.0.1.0 is the only product listed as vulnerable. No other versions or products are currently known to be affected.

Risk and Exploitability

The vulnerability’s complexity is described as high, but the exploit has already been released publicly, making it technically achievable for skilled attackers. EPSS is below one percent, so the current probability of exploitation is low, and it is not listed in the CISA KEV catalog. It is inferred that the likely attack vector is remote over the network, since an attacker who can reach the device’s SSH port can exploit the default credentials to gain full control.

Generated by OpenCVE AI on April 18, 2026 at 14:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the default SSH credentials with unique, strong passwords or SSH key authentication.
  • Apply any vendor‑supplied firmware or patch that eliminates the Dropbear flaw; if none is available, update the device to the latest secure firmware.
  • Disable the Dropbear SSH service when it is not required for remote management.
  • Segregate the device from untrusted networks or place it behind a firewall that only allows trusted management traffic.

Generated by OpenCVE AI on April 18, 2026 at 14:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Ziroom
Ziroom zhome A0101
Vendors & Products Ziroom
Ziroom zhome A0101

Tue, 03 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Ziroom ZHOME A0101 1.0.1.0. Impacted is an unknown function of the component Dropbear SSH Service. This manipulation causes use of default credentials. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Ziroom ZHOME A0101 Dropbear SSH Service default credentials
Weaknesses CWE-1392
References
Metrics cvssV2_0

{'score': 7.6, 'vector': 'AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ziroom Zhome A0101
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:15:17.008Z

Reserved: 2026-02-03T12:53:32.979Z

Link: CVE-2026-1803

cve-icon Vulnrichment

Updated: 2026-02-03T20:26:38.334Z

cve-icon NVD

Status : Deferred

Published: 2026-02-03T20:15:57.973

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:15:04Z

Weaknesses