First published: Tue Mar 25 2025(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
CarlinKit CPC200-CCPA | ||
CarlinKit CPC200-CCPA |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-24349 is rated at 7.6 on the CVSS scale.
Network-adjacent attackers can exploit ZDI-CAN-24349 to bypass authentication.
No, authentication is not required to exploit ZDI-CAN-24349.
The CarlinKit CPC200-CCPA devices are affected by ZDI-CAN-24349.
To protect your system against ZDI-CAN-24349, ensure that you apply the latest security patches and updates provided by the manufacturer.