First published: Wed Apr 23 2025(Updated: )
CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-24349.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
CarlinKit CPC200-CCPA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-2765 is rated as high due to the potential for unauthorized access.
To fix CVE-2025-2765, update the CarlinKit CPC200-CCPA device to the latest firmware version released by the vendor.
CVE-2025-2765 affects installations of the CarlinKit CPC200-CCPA devices.
CVE-2025-2765 is an authentication bypass vulnerability caused by hard-coded credentials.
CVE-2025-2765 can be exploited by network-adjacent attackers, which means it requires local network access.