Description
A flaw has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. The impacted element is an unknown function of the file /cdemos/echs/priv/echs.js. This manipulation of the argument ADMIN_KEY causes hard-coded credentials. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version 5.7.1 is sufficient to resolve this issue. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-05-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the PicoTronica e-Clinic Healthcare System ECHS 5.7 file echs.js allows manipulation of the ADMIN_KEY argument to expose hard-coded credentials. This vulnerability can be exploited remotely and is actively documented, allowing an attacker to gain unauthorized access to the system and potentially sensitive medical data. The weakness is a classic example of hard-coded or weak credentials (CWE-259 and CWE-798), which directly compromises confidentiality and integrity of stored patient information.

Affected Systems

The vulnerability affects PicoTronica e-Clinic Healthcare System ECHS version 5.7. The vendor has released a fixed version, 5.7.1, which removes the hard-coded credentials and mitigates the issue.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high severity, while the EPSS score is not available, making the current exploit probability unknown. The vulnerability is not listed in the CISA KEV catalog, but remote exploitation is feasible through manipulating the ADMIN_KEY argument. Attackers could remotely send crafted requests to trigger the denied credentials logic and gain privileged access.

Generated by OpenCVE AI on May 6, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PicoTronica e-Clinic Healthcare System ECHS software to version 5.7.1 or later to remove the hard-coded credentials.
  • If an immediate upgrade is not possible, disable or remove the ADMIN_KEY functionality and replace the hard-coded credentials with a securely stored, best-practice credential configuration.
  • Review the file /cdemos/echs/priv/echs.js and enforce strict access control, monitor for unauthorized access attempts, and ensure that the system is configured with least privilege principles.

Generated by OpenCVE AI on May 6, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Picotronica
Picotronica e-clinic Healthcare System Echs
Vendors & Products Picotronica
Picotronica e-clinic Healthcare System Echs

Thu, 07 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 19:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. The impacted element is an unknown function of the file /cdemos/echs/priv/echs.js. This manipulation of the argument ADMIN_KEY causes hard-coded credentials. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version 5.7.1 is sufficient to resolve this issue. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title PicoTronica e-Clinic Healthcare System ECHS echs.js hard-coded credentials
Weaknesses CWE-259
CWE-798
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Picotronica E-clinic Healthcare System Echs
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-07T13:55:16.912Z

Reserved: 2026-05-06T12:17:14.544Z

Link: CVE-2026-8032

cve-icon Vulnrichment

Updated: 2026-05-07T13:55:13.412Z

cve-icon NVD

Status : Deferred

Published: 2026-05-06T20:16:36.197

Modified: 2026-05-07T14:08:07.340

Link: CVE-2026-8032

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T21:25:28Z

Weaknesses