An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
History

Tue, 10 Jun 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Kunbus
Kunbus revpi Status
CPEs cpe:2.3:a:kunbus:revpi_status:*:*:*:*:*:*:*:*
Vendors & Products Kunbus
Kunbus revpi Status

Fri, 06 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
Description An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
Title RevPi Webstatus application is vulnerable to an authentication bypass
Weaknesses CWE-704
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-06-06T14:42:31.249Z

Updated: 2025-06-06T15:06:11.989Z

Reserved: 2025-04-16T11:17:48.305Z

Link: CVE-2025-41646

cve-icon Vulnrichment

Updated: 2025-06-06T15:06:00.706Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-06T15:15:26.183

Modified: 2025-06-10T19:29:22.893

Link: CVE-2025-41646

cve-icon Redhat

No data.