The Carlo Gavazzi
EOS-Box
stores hard-coded passwords in the PHP file of
the device. By using the hard-coded passwords, attackers can log into
the device with administrative privileges. This could allow the attacker
to have unauthorized access.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Carlo Gavazzi EOS-Box with firmware before 1.0.0.1080_2.1.10 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by reading a password in a PHP script, a similar issue to CVE-2012-5862. | The Carlo Gavazzi EOS-Box stores hard-coded passwords in the PHP file of the device. By using the hard-coded passwords, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access. |
Title | Carlo Gavazzi EOS Box Hard-Coded Credentials | |
Weaknesses | CWE-798 | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2012-12-23T21:00:00Z
Updated: 2025-07-01T19:59:06.114Z
Reserved: 2012-12-18T00:00:00Z
Link: CVE-2012-6428

No data.

Status : Deferred
Published: 2012-12-23T21:55:01.653
Modified: 2025-07-01T20:15:24.300
Link: CVE-2012-6428

No data.