CVE-2025-10204: CWE-306 Missing Authentication for Critical Function in LG Electronics AC Smart II
A vulnerability has been discovered in AC Smart II where passwords can be changed without authorization. This page contains a hidden form for resetting the administrator password. The attacker can manipulate the page using developer tools to display and use the form. This form allows you to change the administrator password without verifying login status or user permissions.
AI Analysis
Technical Summary
CVE-2025-10204 is a high-severity vulnerability affecting LG Electronics' AC Smart II product, version 2.1.9. The vulnerability is classified under CWE-306, which pertains to missing authentication for critical functions. Specifically, the issue arises from a hidden form within the AC Smart II interface that allows resetting the administrator password without any authentication or authorization checks. An attacker with network access to the device's management interface can manipulate the page using browser developer tools to reveal and submit this hidden password reset form. Because the form does not verify the login status or user permissions, the attacker can change the administrator password arbitrarily. This effectively grants full administrative control over the device without requiring any credentials or user interaction. The CVSS 4.0 score is 7.1 (high), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not impact confidentiality or integrity directly but severely affects availability by enabling unauthorized administrative access, which can lead to device misuse, denial of service, or further compromise. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability was publicly disclosed on September 14, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying LG AC Smart II devices in critical infrastructure, commercial buildings, or smart facility management systems. Unauthorized password resets can lead to complete takeover of the device, allowing attackers to disrupt HVAC controls, cause denial of service, or use the compromised device as a foothold for lateral movement within internal networks. This could impact operational continuity, energy management, and physical environment controls, potentially leading to safety hazards or financial losses. Given the low attack complexity and no requirement for authentication or user interaction, attackers with network access (e.g., internal network or adjacent wireless networks) can exploit this vulnerability easily. The lack of patches increases the window of exposure. Organizations relying on these devices for environmental control should consider this a critical operational risk.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting network access to the AC Smart II management interface by segmenting the network and enforcing strict firewall rules to allow only trusted management stations. Disable or restrict remote management capabilities where possible. Monitor network traffic for unusual access patterns to the device’s web interface, especially attempts to access hidden forms or password reset endpoints. Employ network intrusion detection systems (NIDS) with custom signatures to detect exploitation attempts. Additionally, organizations should engage with LG Electronics for timelines on patches and apply them promptly once available. Consider deploying multi-factor authentication (MFA) at the network level or VPN access for device management to add an additional layer of security. Finally, conduct regular audits of device configurations and access logs to detect unauthorized changes.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10204: CWE-306 Missing Authentication for Critical Function in LG Electronics AC Smart II
Description
A vulnerability has been discovered in AC Smart II where passwords can be changed without authorization. This page contains a hidden form for resetting the administrator password. The attacker can manipulate the page using developer tools to display and use the form. This form allows you to change the administrator password without verifying login status or user permissions.
AI-Powered Analysis
Technical Analysis
CVE-2025-10204 is a high-severity vulnerability affecting LG Electronics' AC Smart II product, version 2.1.9. The vulnerability is classified under CWE-306, which pertains to missing authentication for critical functions. Specifically, the issue arises from a hidden form within the AC Smart II interface that allows resetting the administrator password without any authentication or authorization checks. An attacker with network access to the device's management interface can manipulate the page using browser developer tools to reveal and submit this hidden password reset form. Because the form does not verify the login status or user permissions, the attacker can change the administrator password arbitrarily. This effectively grants full administrative control over the device without requiring any credentials or user interaction. The CVSS 4.0 score is 7.1 (high), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not impact confidentiality or integrity directly but severely affects availability by enabling unauthorized administrative access, which can lead to device misuse, denial of service, or further compromise. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability was publicly disclosed on September 14, 2025.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying LG AC Smart II devices in critical infrastructure, commercial buildings, or smart facility management systems. Unauthorized password resets can lead to complete takeover of the device, allowing attackers to disrupt HVAC controls, cause denial of service, or use the compromised device as a foothold for lateral movement within internal networks. This could impact operational continuity, energy management, and physical environment controls, potentially leading to safety hazards or financial losses. Given the low attack complexity and no requirement for authentication or user interaction, attackers with network access (e.g., internal network or adjacent wireless networks) can exploit this vulnerability easily. The lack of patches increases the window of exposure. Organizations relying on these devices for environmental control should consider this a critical operational risk.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting network access to the AC Smart II management interface by segmenting the network and enforcing strict firewall rules to allow only trusted management stations. Disable or restrict remote management capabilities where possible. Monitor network traffic for unusual access patterns to the device’s web interface, especially attempts to access hidden forms or password reset endpoints. Employ network intrusion detection systems (NIDS) with custom signatures to detect exploitation attempts. Additionally, organizations should engage with LG Electronics for timelines on patches and apply them promptly once available. Consider deploying multi-factor authentication (MFA) at the network level or VPN access for device management to add an additional layer of security. Finally, conduct regular audits of device configurations and access logs to detect unauthorized changes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- LGE
- Date Reserved
- 2025-09-10T01:26:32.811Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c6b93c72e3f37451632354
Added to database: 9/14/2025, 12:46:52 PM
Last enriched: 9/22/2025, 12:37:22 AM
Last updated: 10/29/2025, 9:28:42 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.