The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Tue, 23 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
2wcom
2wcom ip-4c |
|
Vendors & Products |
2wcom
2wcom ip-4c |
Mon, 22 Sep 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-09-22T00:00:00.000Z
Updated: 2025-09-23T18:13:40.814Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57433

Updated: 2025-09-23T16:04:42.388Z

Status : Awaiting Analysis
Published: 2025-09-22T16:15:44.890
Modified: 2025-09-23T19:15:40.597
Link: CVE-2025-57433

No data.