Description
A vulnerability was identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The impacted element is an unknown function of the file /fs of the component Configuration Data Handler. Such manipulation of the argument File leads to information disclosure. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Update
AI Analysis

Impact

A flaw exists in the Configuration Data Handler of Technostrobe HI-LED-WR120-G2 firmware 5.5.0.1R6.03.30. An attacker can manipulate the argument passed to an unknown function that processes the /fs file, causing the device to leak sensitive configuration data. The vulnerability can be exploited remotely and publicly available exploits have already been released.

Affected Systems

The identified target is the Technostrobe HI-LED-WR120-G2 running firmware version 5.5.0.1R6.03.30. No additional firmware versions are listed as affected in the available data.

Risk and Exploitability

The CVSS score of 6.9 places the threat in the medium severity range. With no EPSS data and absence from the KEV catalog, the risk is primarily driven by the existence of a remote attack vector and an available exploit. If successful, the disclosure of configuration details compromises confidentiality and may enable further network or device compromise. The attack vector is inferred to be remote as the description states that the attack can be launched from outside the device.

Generated by OpenCVE AI on April 5, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Technostrobe for a firmware update that addresses the /fs configuration data disclosure.
  • If no update is available, restrict external access to the device’s management interface by placing it behind a firewall or VPN.
  • Monitor network traffic and system logs for unauthorized attempts to read configuration data and investigate any suspicious activity.

Generated by OpenCVE AI on April 5, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Technostrobe
Technostrobe hi-led-wr120-g2
Vendors & Products Technostrobe
Technostrobe hi-led-wr120-g2

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The impacted element is an unknown function of the file /fs of the component Configuration Data Handler. Such manipulation of the argument File leads to information disclosure. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Technostrobe HI-LED-WR120-G2 Configuration Data fs information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Technostrobe Hi-led-wr120-g2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:27:09.752Z

Reserved: 2026-04-04T14:41:07.612Z

Link: CVE-2026-5571

cve-icon Vulnrichment

Updated: 2026-04-06T15:27:04.718Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T14:16:18.123

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:40Z

Weaknesses