Description
Cross-Site Request Forgery in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI
Published: 2026-01-27
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Now
AI Analysis

Impact

A cross‑site request forgery flaw in the admin UI of EZCast Pro II dongle firmware version 1.17478.146 allows an attacker to bypass authorization checks and gain full access to the administrative interface. The vulnerability is exploited by tricking a browser that has authenticated to the device into submitting privileged requests, thereby providing the attacker with the same level of control as a legitimate administrator. The impact is the ability to modify device settings, add or remove remote endpoints, and potentially change firmware or network configuration, compromising the integrity and availability of the device.

Affected Systems

Affected systems include Nimbletech EZCast Pro II wireless dongles running firmware 1.17478.146. This applies to the hardware dongle as well as the boxed product that contains the same firmware. No other firmware versions are listed as affected in the CNA data, so the risk is confined to devices that have not yet been updated beyond version 1.17478.146.

Risk and Exploitability

The CVSS score of 6.8 classifies this flaw as a moderate severity vulnerability with a moderate impact and the risk of exploitation depends on the device’s exposure. The EPSS score of less than 1 % indicates a very low likelihood of real-world exploitation, and the vulnerability is not currently listed in the CISA KEV catalog, further reducing the urgency of immediate action for most environments. The likely attack vector is an on‑network or via a local administrator’s browser; an attacker would need to persuade or trick the admin user to perform a request while authenticated, or otherwise leverage an existing authenticated session. Because CSRF controls are missing, the attacker can submit arbitrary administrative requests without re‑authentication.

Generated by OpenCVE AI on April 18, 2026 at 02:16 UTC.

Remediation

Vendor Workaround

Until a firmware patch is made available by the vendor, users are advised to disconnect the dongle from their local network and limit its use strictly to Access Point functionality to minimize the attack surface.


OpenCVE Recommended Actions

  • Upgrade to the latest firmware from Nimbletech that removes the CSRF issue.
  • If no patch is available, disconnect the dongle from the local network and use it solely as an Access Point to reduce exposure.
  • Restrict admin UI access to trusted IP addresses and enforce stronger authentication controls.

Generated by OpenCVE AI on April 18, 2026 at 02:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 05 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Nimbletech
Nimbletech ezcast Pro Dongle Ii
Nimbletech ezcast Pro Dongle Ii Firmware
Weaknesses CWE-352
CPEs cpe:2.3:h:nimbletech:ezcast_pro_dongle_ii:-:*:*:*:*:*:*:*
cpe:2.3:o:nimbletech:ezcast_pro_dongle_ii_firmware:1.17478.146:*:*:*:*:*:*:*
Vendors & Products Nimbletech
Nimbletech ezcast Pro Dongle Ii
Nimbletech ezcast Pro Dongle Ii Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware
Vendors & Products Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI
Title Cross-Site Request Forgery in EZCast Pro II Dongle
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:Y/RE:L'}


Subscriptions

Actions-micro Ezcast Pro Ii Ezcast Pro Ii Firmware
Nimbletech Ezcast Pro Dongle Ii Ezcast Pro Dongle Ii Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-01-27T15:22:21.306Z

Reserved: 2026-01-22T12:55:22.578Z

Link: CVE-2026-24345

cve-icon Vulnrichment

Updated: 2026-01-27T15:22:17.937Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T10:15:48.937

Modified: 2026-02-05T17:32:34.180

Link: CVE-2026-24345

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:30:15Z

Weaknesses