The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device.
References
Configurations
No configuration.
History
23 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 - | |
CWE | CWE-200 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
22 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-22 16:15
Updated : 2025-09-23 19:15
NVD link : CVE-2025-57433
Mitre link : CVE-2025-57433
CVE.ORG link : CVE-2025-57433
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor