Vulnerabilities (CVE)

Filtered by CWE-798
Total 650 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-39185 1 Exfo 2 Bv-10, Bv-10 Firmware 2025-04-08 N/A 9.8 CRITICAL
EXFO - BV-10 Performance Endpoint Unit Undocumented privileged user. Unit has an undocumented hard-coded privileged user.
CVE-2024-50688 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.8 CRITICAL
SunGrow iSolarCloud Android application V2.1.6.20241017 and prior contains hardcoded credentials. The application (regardless of the user account) and the cloud uses the same MQTT credentials for exchanging the device telemetry.
CVE-2024-57040 1 Tp-link 2 Tl-wr845n, Tl-wr845n Firmware 2025-04-07 N/A 9.8 CRITICAL
TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force attack through physical access to the router.
CVE-2024-20439 1 Cisco 1 Smart License Utility 2025-04-03 N/A 9.8 CRITICAL
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CVE-2024-35396 1 Totolink 2 Cp900l, Cp900l Firmware 2025-04-03 N/A 9.8 CRITICAL
TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password for telnet in /web_cste/cgi-bin/product.ini, which allows attackers to log in as root.
CVE-2005-0496 1 Arkeia 1 Network Backup 2025-04-03 7.5 HIGH 9.8 CRITICAL
Arkeia Network Backup Client 5.x contains hard-coded credentials that effectively serve as a back door, which allows remote attackers to access the file system and possibly execute arbitrary commands.
CVE-2025-2538 2025-04-01 N/A 9.8 CRITICAL
A hardcoded credential vulnerability exists in a specific deployment pattern for Esri Portal for ArcGIS versions 11.4 and below that may allow a remote authenticated attacker to gain administrative access to the system.
CVE-2024-29855 2025-03-27 N/A 9.0 CRITICAL
Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator
CVE-2024-24681 1 Yealink 1 Configuration Encryption Tool 2025-03-25 N/A 9.8 CRITICAL
An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.
CVE-2025-30137 2025-03-25 N/A 9.8 CRITICAL
An issue was discovered in the G-Net GNET APK 2.6.2. Hardcoded credentials exist in in APK for ports 9091 and 9092. The GNET mobile application contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092. Once the GNET SSID is connected to, the attacker sends a crafted authentication command with TibetList and 000000 to list settings of the dashcam at port 9091. There's a separate set of credentials for port 9092 (stream) that is also exposed in cleartext: admin + tibet. For settings, the required credentials are adim + 000000.
CVE-2022-45766 1 Keystorage 1 Global Facilities Management Software 2025-03-24 N/A 9.1 CRITICAL
Hardcoded credentials in Global Facilities Management Software (GFMS) Version 3 software distributed by Key Systems Management permits remote attackers to impact availability, confidentiality, accessibility and dependability of electronic key boxes.
CVE-2025-30123 2025-03-21 N/A 9.8 CRITICAL
An issue was discovered on ROADCAM X3 devices. The mobile app APK (Viidure) contains hardcoded FTP credentials for the FTPX user account, enabling attackers to gain unauthorized access and extract sensitive recorded footage from the device.
CVE-2025-30122 2025-03-21 N/A 9.8 CRITICAL
An issue was discovered on ROADCAM X3 devices. It has a uniform default credential set that cannot be modified by users, making it easy for attackers to gain unauthorized access to multiple devices.
CVE-2024-38466 1 Guoxinled 1 Synthesis Image System 2025-03-19 N/A 9.8 CRITICAL
Shenzhen Guoxin Synthesis image system before 8.3.0 has a 123456Qw default password.
CVE-2024-48126 2025-03-18 N/A 9.8 CRITICAL
HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access.
CVE-2025-26410 2025-03-18 N/A 9.8 CRITICAL
The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1.
CVE-2024-42638 1 H3c 2 Magic B1st, Magic B1st Firmware 2025-03-17 N/A 9.8 CRITICAL
H3C Magic B1ST v100R012 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.
CVE-2022-46637 1 Prolink2u 2 Prs1841, Prs1841 Firmware 2025-03-14 N/A 9.8 CRITICAL
Prolink router PRS1841 was discovered to contain hardcoded credentials for its Telnet and FTP services.
CVE-2024-0390 1 Inprax 1 Izzi Connect 2025-03-13 N/A 9.8 CRITICAL
INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
CVE-2025-1393 2025-03-05 N/A 9.8 CRITICAL
An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.