Description
The embedded web interface of the device does not support HTTPS/TLS for
authentication and uses HTTP Basic Authentication. Traffic is encoded
but not encrypted, exposing user credentials to passive interception by
attackers on the same network.
Published: 2026-02-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential Credential Theft via Unencrypted HTTP Basic Authentication
Action: Replace Device
AI Analysis

Impact

The embedded web interface of the device does not support HTTPS/TLS for authentication and instead uses HTTP Basic Authentication; traffic is merely encoded, not encrypted, exposing user credentials to passive network sniffing. This flaw, identified as CWE‑319, allows an attacker capable of eavesdropping on the local network to capture account names and passwords, potentially granting unauthorized control of the device's functions and the sensitive data it manages.

Affected Systems

The vulnerability impacts the Jinan USR IOT Technology Limited (PUSR) USR‑W610 devices. No specific firmware or build numbers are listed, and the product is listed as end‑of‑life by the vendor, which implies no forthcoming patches will be released.

Risk and Exploitability

With a CVSS score of 7.5, the severity is high. The EPSS score is listed as < 1 %, indicating a low probability of exploitation in the wild, and the vulnerability is not catalogued in the CISA KEV list. The likely attack vector is passive interception on the same local network; an adversary does not need to execute code but must be able to sniff network traffic. While the immediate threat is credential disclosure, compromised credentials could lead to broader compromise of connected systems. Overall the risk remains moderate to high for networks that are not properly segmented or isolated.

Generated by OpenCVE AI on April 18, 2026 at 11:31 UTC.

Remediation

Vendor Workaround

Jinan USR IOT Technology Limited (PUSR) has stated that the product is end-of-life, and there are no plans to patch. Users of PUSR USR-W610 devices are encouraged to contact PUSR and keep their systems up to date.


OpenCVE Recommended Actions

  • Contact PUSR vendor to discuss replacement or temporary solutions, as no patch is available and the device is end‑of‑life.
  • Isolate the device on a dedicated network segment or firewall it behind a secure gateway to limit passive sniffing opportunities.
  • Consider replacing the USR‑W610 with a device that supports HTTPS/TLS or implementing a secure tunnel (e.g., VPN or reverse proxy) to access the web interface.
  • If replacement is not immediately possible, monitor network traffic for HTTP authentication exchanges and ensure credential credentials are changed regularly to reduce exposure.

Generated by OpenCVE AI on April 18, 2026 at 11:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Jinan Usr Iot Technology Limited (pusr)
Jinan Usr Iot Technology Limited (pusr) usr-w610
Vendors & Products Jinan Usr Iot Technology Limited (pusr)
Jinan Usr Iot Technology Limited (pusr) usr-w610

Fri, 20 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.
Title Jinan USR IOT Technology Limited (PUSR) USR-W610 Cleartext Transmission of Sensitive Information
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Jinan Usr Iot Technology Limited (pusr) Usr-w610
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-02-20T20:01:11.347Z

Reserved: 2026-02-10T15:52:10.245Z

Link: CVE-2026-24455

cve-icon Vulnrichment

Updated: 2026-02-20T20:01:02.805Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T17:25:51.143

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24455

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:45:44Z

Weaknesses