Description
Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to access protected areas in the web application
Published: 2026-01-27
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Change Password
AI Analysis

Impact

Use of well‑known default credentials in the administration interface of the EZCast Pro II dongle, specifically firmware version 1.17478.146, permits an attacker who can reach the device’s web UI to log in as administrator. This grants full control over the device, enabling configuration changes, firmware upgrades, and modification of network settings, which could facilitate further compromise of the host network. The weakness results from improper credential management and is categorized as CWE‑798.

Affected Systems

NimbleTech’s EZCast Pro II dongle, running firmware version 1.17478.146. The affected component is the web‑based administration UI provided by the dongle’s firmware.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity impact of unauthorized privileged access. The EPSS score is below 1%, suggesting that active exploitation is currently rare, and the vulnerability is not listed in CISA’s KEV catalog. However, the device is typically accessible from local or corporate networks, so any user who can reach the web UI—whether through unsecured Wi‑Fi, physical access, or a compromised network—can exploit this flaw. Once authenticated, the attacker gains complete administrative control, which could lead to configuration tampering, data exfiltration, or the use of the device as a foothold for further network attacks.

Generated by OpenCVE AI on April 18, 2026 at 18:47 UTC.

Remediation

Vendor Workaround

All users are encouraged to change the admin password upon first use.


OpenCVE Recommended Actions

  • Change the administrator password to a strong, unique value as soon as possible.
  • If available, upgrade the dongle to a firmware release that eliminates the default credential issue.
  • Restrict network access to the dongle’s web interface by applying firewall rules or placing it on a separate VLAN, limiting exposure to trusted users only.

Generated by OpenCVE AI on April 18, 2026 at 18:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Thu, 05 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Nimbletech
Nimbletech ezcast Pro Dongle Ii
Nimbletech ezcast Pro Dongle Ii Firmware
CPEs cpe:2.3:h:nimbletech:ezcast_pro_dongle_ii:-:*:*:*:*:*:*:*
cpe:2.3:o:nimbletech:ezcast_pro_dongle_ii_firmware:1.17478.146:*:*:*:*:*:*:*
Vendors & Products Nimbletech
Nimbletech ezcast Pro Dongle Ii
Nimbletech ezcast Pro Dongle Ii Firmware
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware
Vendors & Products Actions-micro
Actions-micro ezcast Pro Ii
Actions-micro ezcast Pro Ii Firmware

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to access protected areas in the web application
Title Use of well-known default credentials in EZCast Pro II Dongle
Weaknesses CWE-798
References
Metrics cvssV4_0

{'score': 7.6, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:U'}


Subscriptions

Actions-micro Ezcast Pro Ii Ezcast Pro Ii Firmware
Nimbletech Ezcast Pro Dongle Ii Ezcast Pro Dongle Ii Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-01-27T15:21:10.523Z

Reserved: 2026-01-22T12:55:22.578Z

Link: CVE-2026-24346

cve-icon Vulnrichment

Updated: 2026-01-27T15:21:05.406Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-27T10:15:49.073

Modified: 2026-02-05T17:32:26.010

Link: CVE-2026-24346

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:00:08Z

Weaknesses