Description
A vulnerability was determined in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The affected element is the function index_config of the file /LoginCB. This manipulation causes improper authentication. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Authentication Bypass
Action: Assess Impact
AI Analysis

Impact

The vulnerability resides in the index_config function of the /LoginCB file in Technostrobe HI‑LED‑WR120‑G2 firmware 5.5.0.1R6.03.30. Exploitation manipulates the authentication process, allowing an attacker to gain access without valid credentials. The result is unauthorized entry to the device’s control interface, potentially leading to control of device functions, data disclosure, and further lateral movement. The weakness is classified as improper authentication and corresponds to CWE‑287.

Affected Systems

Technostrobe’s HI‑LED‑WR120‑G2 network lighting controller, version 5.5.0.1R6.03.30. All units running this firmware are vulnerable; newer or patched builds are not explicitly cited as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high severity. No EPSS value is available, and the vulnerability is not listed in CISA’s KEV catalog, but the exploit has been publicly disclosed and could be used remotely over an exposed network. Attackers can target the device from outside the local network, assuming the /LoginCB endpoint is reachable. In the absence of an official patch, the risk remains significant until mitigated or isolated.

Generated by OpenCVE AI on April 5, 2026 at 16:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the firmware version on all HI‑LED‑WR120‑G2 devices; identify units running 5.5.0.1R6.03.30.
  • Contact Technostrobe or review the official vendor website for a firmware update or security advisory addressing this authentication bypass.
  • If no patch is available, block external access to the /LoginCB endpoint using a firewall or NAT rule, limiting exposure to trusted internal networks only.
  • Change default or weak credentials on the device, and enforce strong password policies if supported.
  • Monitor device logs for unauthorized access attempts and apply security best practices such as restricting management interfaces to secure IP ranges.

Generated by OpenCVE AI on April 5, 2026 at 16:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Technostrobe
Technostrobe hi-led-wr120-g2
Vendors & Products Technostrobe
Technostrobe hi-led-wr120-g2

Sun, 05 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The affected element is the function index_config of the file /LoginCB. This manipulation causes improper authentication. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Technostrobe HI-LED-WR120-G2 LoginCB index_config improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Technostrobe Hi-led-wr120-g2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T02:52:24.106Z

Reserved: 2026-04-04T14:41:03.744Z

Link: CVE-2026-5570

cve-icon Vulnrichment

Updated: 2026-04-07T02:52:20.316Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T14:16:17.940

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:41Z

Weaknesses