Description
A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacted is an unknown function of the file /?_route=settings/users-view/ of the component Endpoint. The manipulation of the argument ID results in improper control of resource identifiers. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Resource injection leading to potential data exposure
Action: Apply Patch
AI Analysis

Impact

A flaw was detected in the 2025.3.20 release of BichitroGan ISP Billing Software affecting the Endpoint component’s users‑view route. By manipulating the ID argument, an attacker can cause improper control of resource identifiers, enabling remote resource injection. The public exploit demonstrates that the weakness can be leveraged from outside the network, potentially allowing unauthorized access to or modification of billing or user data.

Affected Systems

This vulnerability applies only to the BichitroGan ISP Billing Software version 2025.3.20. No later, patched release is documented, so all installations of this specific version remain vulnerable.

Risk and Exploitability

With a CVSS score of 5.3 the risk is moderate, yet the attack can reach end‑points remotely and the exploit is publicly available. Although EPSS data is missing and the issue is not listed in CISA’s KEV catalog, the lack of a vendor response underscores the potential for unmitigated exposure if no interim controls are applied.

Generated by OpenCVE AI on March 29, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a newer, patched version of BichitroGan ISP Billing Software exists and upgrade immediately if available
  • Configure web application firewall or network rules to block access to the /?_route=settings/users-view/ endpoint from untrusted sources
  • If customization is possible, enforce strict validation or whitelisting on the ID parameter for the affected route
  • Monitor application logs for signs of unauthorized parameter manipulation or repeated failed requests to the vulnerable endpoint
  • Contact BichitroGan support to request a formal fix and track communication for audit purposes

Generated by OpenCVE AI on March 29, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Bichitrogan
Bichitrogan isp Billing Software
Vendors & Products Bichitrogan
Bichitrogan isp Billing Software

Sun, 29 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacted is an unknown function of the file /?_route=settings/users-view/ of the component Endpoint. The manipulation of the argument ID results in improper control of resource identifiers. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title BichitroGan ISP Billing Software Endpoint users-view resource injection
Weaknesses CWE-99
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bichitrogan Isp Billing Software
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T14:27:38.186Z

Reserved: 2026-03-27T16:05:48.199Z

Link: CVE-2026-5031

cve-icon Vulnrichment

Updated: 2026-04-01T14:27:33.580Z

cve-icon NVD

Status : Deferred

Published: 2026-03-29T05:15:55.957

Modified: 2026-04-24T16:36:24.067

Link: CVE-2026-5031

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:58:38Z

Weaknesses