authentication and uses HTTP Basic Authentication. Traffic is encoded
but not encrypted, exposing user credentials to passive interception by
attackers on the same network.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Jinan USR IOT Technology Limited (PUSR) has stated that the product is end-of-life, and there are no plans to patch. Users of PUSR USR-W610 devices are encouraged to contact PUSR and keep their systems up to date.
Fri, 20 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network. | |
| Title | Jinan USR IOT Technology Limited (PUSR) USR-W610 Cleartext Transmission of Sensitive Information | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-20T20:01:11.347Z
Reserved: 2026-02-10T15:52:10.245Z
Link: CVE-2026-24455
Updated: 2026-02-20T20:01:02.805Z
Status : Awaiting Analysis
Published: 2026-02-20T17:25:51.143
Modified: 2026-02-20T18:57:15.973
Link: CVE-2026-24455
No data.
OpenCVE Enrichment
No data.