First published: Tue Feb 11 2025(Updated: )
The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1.
Credit: 551230f0-3615-47bd-b7cc-93e92e730bbf
Affected Software | Affected Version | How to fix |
---|---|---|
Wattsense Bridge | <6.4.1 |
This issue is fixed in recent firmware versions BSP >= 6.4.1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26410 is considered a high severity vulnerability due to the use of hard-coded credentials that can be exploited for unauthorized access.
To fix CVE-2025-26410, users should update their Wattsense Bridge devices to the latest firmware version that addresses the hard-coded credential issue.
CVE-2025-26410 affects all versions of Wattsense Bridge devices up to version 6.4.1.
Exploitation of CVE-2025-26410 can lead to unauthorized access to the device, allowing attackers to manipulate or gather sensitive information.
As of now, there are no publicly disclosed exploits specifically targeting CVE-2025-26410, but the hard-coded credentials make it a considerable risk.