Description
Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug
settings (e.g., enabling SSH), allowing unauthorized state changes that
can facilitate later compromise.
Published: 2026-04-17
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration changes
Action: Contact vendor
AI Analysis

Impact

Anviz CX2 Lite and CX7 devices permit unauthenticated POST requests that alter debug settings such as enabling SSH, allowing an attacker to change device configuration without authentication. This flaw is identified as CWE-306 and can facilitate later compromise by granting the attacker the ability to modify system state without proper credentials.

Affected Systems

The vulnerability affects all firmware builds of the Anviz CX2 Lite and Anviz CX7 devices. No specific firmware releases were listed, implying that any current firmware on these models is susceptible unless patched by the vendor.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The EPSS score is <1%, signifying a low but non‑zero probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. An attacker can exploit the missing authentication on the debug interface from any network location that can reach the device, so the risk is significant for exposed or poorly segmented networks.

Generated by OpenCVE AI on April 18, 2026 at 19:25 UTC.

Remediation

Vendor Workaround

Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.


OpenCVE Recommended Actions

  • Contact Anviz for a firmware update that addresses this vulnerability.
  • Disable SSH or other debug options on the device, if available, until a vendor firmware update is released.
  • Block unauthenticated POST requests to the device by configuring firewall rules or network segmentation.
  • Monitor device logs for unauthorized POST requests and configuration changes.

Generated by OpenCVE AI on April 18, 2026 at 19:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Anviz cx2 Lite
Anviz cx2 Lite Firmware
Anviz cx7
Anviz cx7 Firmware
CPEs cpe:2.3:h:anviz:cx2_lite:-:*:*:*:*:*:*:*
cpe:2.3:h:anviz:cx7:-:*:*:*:*:*:*:*
cpe:2.3:o:anviz:cx2_lite_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:anviz:cx7_firmware:-:*:*:*:*:*:*:*
Vendors & Products Anviz cx2 Lite
Anviz cx2 Lite Firmware
Anviz cx7
Anviz cx7 Firmware

Fri, 17 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Anviz
Anviz anviz Cx2 Lite Firmware
Anviz anviz Cx7 Firmware
Vendors & Products Anviz
Anviz anviz Cx2 Lite Firmware
Anviz anviz Cx7 Firmware

Fri, 17 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
Description Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug settings (e.g., enabling SSH), allowing unauthorized state changes that can facilitate later compromise.
Title Anviz Products Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Anviz Anviz Cx2 Lite Firmware Anviz Cx7 Firmware Cx2 Lite Cx2 Lite Firmware Cx7 Cx7 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-17T20:03:18.872Z

Reserved: 2026-04-14T15:52:06.314Z

Link: CVE-2026-40461

cve-icon Vulnrichment

Updated: 2026-04-17T20:03:05.555Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-17T20:16:36.217

Modified: 2026-05-04T14:30:29.097

Link: CVE-2026-40461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:30:08Z

Weaknesses