An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
Metrics
Affected Vendors & Products
References
History
Tue, 10 Jun 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Kunbus
Kunbus revpi Status |
|
CPEs | cpe:2.3:a:kunbus:revpi_status:*:*:*:*:*:*:*:* | |
Vendors & Products |
Kunbus
Kunbus revpi Status |
Fri, 06 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Jun 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device | |
Title | RevPi Webstatus application is vulnerable to an authentication bypass | |
Weaknesses | CWE-704 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-06-06T14:42:31.249Z
Updated: 2025-06-06T15:06:11.989Z
Reserved: 2025-04-16T11:17:48.305Z
Link: CVE-2025-41646

Updated: 2025-06-06T15:06:00.706Z

Status : Analyzed
Published: 2025-06-06T15:15:26.183
Modified: 2025-06-10T19:29:22.893
Link: CVE-2025-41646

No data.