There is an unauthorized access vulnerability in ZTE MU5250. Due to improper permission control of the Web interface, an unauthorized attacker can  modify configuration through the interface.
History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Zte
Zte mu5250
Vendors & Products Zte
Zte mu5250

Tue, 19 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 08:45:00 +0000

Type Values Removed Values Added
Description There is an unauthorized access vulnerability in ZTE MU5250. Due to improper permission control of the Web interface, an unauthorized attacker can  modify configuration through the interface.
Title Unauthorized access vulnerability in ZTE MU5250
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zte

Published: 2026-05-19T07:45:05.146Z

Updated: 2026-05-19T13:24:26.608Z

Reserved: 2026-05-06T08:50:27.676Z

Link: CVE-2026-44408

cve-icon Vulnrichment

Updated: 2026-05-19T13:24:24.030Z

cve-icon NVD

Status : Deferred

Published: 2026-05-19T09:16:20.020

Modified: 2026-05-19T14:50:07.413

Link: CVE-2026-44408

cve-icon Redhat

No data.