First published: Tue Mar 25 2025(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
CarlinKit CPC200-CCPA | ||
CarlinKit CPC200-CCPA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-25-177 is rated at 7.6 on the CVSS scale.
ZDI-25-177 allows network-adjacent attackers to bypass authentication on affected CarlinKit CPC200-CCPA devices.
No, authentication is not required to exploit the ZDI-25-177 vulnerability.
ZDI-25-177 affects CarlinKit CPC200-CCPA devices.
Mitigating the risks of ZDI-25-177 may involve applying security patches or updates from the vendor for affected devices.