A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
History

Mon, 07 Jul 2025 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-07-07T00:00:00.000Z

Updated: 2025-07-07T15:19:38.994Z

Reserved: 2025-06-17T00:00:00.000Z

Link: CVE-2025-52492

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-07-07T16:15:24.233

Modified: 2025-07-07T16:15:24.233

Link: CVE-2025-52492

cve-icon Redhat

No data.