Impact
A flaw in SenseLive X3050's web management interface permits modification of critical configuration parameters without proper authorization or validation, as identified by CWE-862. Attackers who can reach the web interface can change IP addressing, watchdog timer settings, reconnect intervals, and service ports to unsupported or unsafe values, directly affecting core device behaviour and recovery mechanisms. This can destabilize the device or render it persistently unavailable, causing denial of service to the protected processes.
Affected Systems
Only the SenseLive X3050 industrial control product is listed as affected. No specific firmware or software version information is provided, so all variants of the X3050 are potentially vulnerable until a vendor statement clarifies otherwise.
Risk and Exploitability
The CVSS score of 7.2 indicates significant impact from this flaw. The EPSS score is below 1% and the vulnerability is not included in CISA’s KEV catalog, suggesting a relatively low probability of widespread exploitation at present. However, the attack requires access to the device’s web management interface – a remote yet privileged exposure – and the lack of sufficient validation makes the configuration changes deterministic and repeatable. If an attacker gains this access, they can immediately alter the controlled parameters and cause operational disruption.
OpenCVE Enrichment