Impact
This vulnerability arises from the improper validation of a login parameter. An attacker can supply a crafted URL that, after the user authenticates, redirects them to a malicious site. The lack of validation allows the attacker to execute phishing attacks or otherwise capture credentials from unsuspecting users. The weakness maps to CWE‑601, an open redirect flaw.
Affected Systems
SICK AG TDC‑X401GL devices using firmware versions prior to 1.5.0 are affected. The issue is present in both the hardware and firmware components of the product as listed in the CPE taxonomy.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate impact, while the EPSS score of less than 1% shows a low likelihood of exploitation at this time. The vulnerability is not currently listed in the CISA KEV catalog. An attacker would need the ability to reach the device’s login interface; after successful authentication, the open redirect can be leveraged to deliver phishing content. Because the flaw exists after normal user login, the potential for credential theft remains significant if users are tricked into submitting sensitive information to the redirect target.
OpenCVE Enrichment