Impact
A weakness in the web management interface of SenseLive X3050 permits an attacker with network access to bypass authentication controls and call configuration endpoints that are meant to be protected. This unauthorized access could allow the attacker to read, modify, or delete device settings, potentially compromising the confidentiality, integrity, or availability of the equipment and the network it supports. The flaw is identified as a weakness in authentication and authorization enforcement, corresponding to CWE‑288.
Affected Systems
The vulnerability affects the SenseLive X3050 industrial device. No specific firmware or software version ranges are provided, so any installed instance of the X3050 that exposes the web management interface is potentially impacted.
Risk and Exploitability
The CVSS score is 9.3, indicating critical severity. The EPSS score of less than 1% suggests that exploitation likelihood is very low at present, and the flaw is not listed in CISA’s KEV catalog. The attack requires network access to the device, and the attacker can simply send web requests to the unauthorized endpoints to read or change configuration data. Attackers do not need special privileges on the host, so the risk to the broader network depends on how the management interface is exposed.
OpenCVE Enrichment