A vulnerability, which was classified as problematic, was found in iteaj iboot 物联网网关 1.1.3. This affects an unknown part of the file /core/admin/pwd of the component Admin Password Handler. The manipulation of the argument ID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 08 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Iteaj
Iteaj iboot
Weaknesses CWE-434
CPEs cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:*
Vendors & Products Iteaj
Iteaj iboot

Mon, 07 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 06 Apr 2025 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as problematic, was found in iteaj iboot 物联网网关 1.1.3. This affects an unknown part of the file /core/admin/pwd of the component Admin Password Handler. The manipulation of the argument ID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title iteaj iboot 物联网网关 Admin Password pwd access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-04-06T23:00:09.284Z

Updated: 2025-04-07T14:06:13.430Z

Reserved: 2025-04-06T05:50:30.628Z

Link: CVE-2025-3325

cve-icon Vulnrichment

Updated: 2025-04-07T14:06:03.417Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-06T23:15:39.640

Modified: 2025-04-08T18:53:43.787

Link: CVE-2025-3325

cve-icon Redhat

No data.