Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10204: CWE-306 Missing Authentication for Critical Function in LG Electronics AC Smart II

0
High
VulnerabilityCVE-2025-10204cvecve-2025-10204cwe-306
Published: Sun Sep 14 2025 (09/14/2025, 12:43:30 UTC)
Source: CVE Database V5
Vendor/Project: LG Electronics
Product: AC Smart II

Description

A vulnerability has been discovered in AC Smart II where passwords can be changed without authorization. This page contains a hidden form for resetting the administrator password. The attacker can manipulate the page using developer tools to display and use the form. This form allows you to change the administrator password without verifying login status or user permissions.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:37:22 UTC

Technical Analysis

CVE-2025-10204 is a high-severity vulnerability affecting LG Electronics' AC Smart II product, version 2.1.9. The vulnerability is classified under CWE-306, which pertains to missing authentication for critical functions. Specifically, the issue arises from a hidden form within the AC Smart II interface that allows resetting the administrator password without any authentication or authorization checks. An attacker with network access to the device's management interface can manipulate the page using browser developer tools to reveal and submit this hidden password reset form. Because the form does not verify the login status or user permissions, the attacker can change the administrator password arbitrarily. This effectively grants full administrative control over the device without requiring any credentials or user interaction. The CVSS 4.0 score is 7.1 (high), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not impact confidentiality or integrity directly but severely affects availability by enabling unauthorized administrative access, which can lead to device misuse, denial of service, or further compromise. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability was publicly disclosed on September 14, 2025.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying LG AC Smart II devices in critical infrastructure, commercial buildings, or smart facility management systems. Unauthorized password resets can lead to complete takeover of the device, allowing attackers to disrupt HVAC controls, cause denial of service, or use the compromised device as a foothold for lateral movement within internal networks. This could impact operational continuity, energy management, and physical environment controls, potentially leading to safety hazards or financial losses. Given the low attack complexity and no requirement for authentication or user interaction, attackers with network access (e.g., internal network or adjacent wireless networks) can exploit this vulnerability easily. The lack of patches increases the window of exposure. Organizations relying on these devices for environmental control should consider this a critical operational risk.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting network access to the AC Smart II management interface by segmenting the network and enforcing strict firewall rules to allow only trusted management stations. Disable or restrict remote management capabilities where possible. Monitor network traffic for unusual access patterns to the device’s web interface, especially attempts to access hidden forms or password reset endpoints. Employ network intrusion detection systems (NIDS) with custom signatures to detect exploitation attempts. Additionally, organizations should engage with LG Electronics for timelines on patches and apply them promptly once available. Consider deploying multi-factor authentication (MFA) at the network level or VPN access for device management to add an additional layer of security. Finally, conduct regular audits of device configurations and access logs to detect unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
LGE
Date Reserved
2025-09-10T01:26:32.811Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c6b93c72e3f37451632354

Added to database: 9/14/2025, 12:46:52 PM

Last enriched: 9/22/2025, 12:37:22 AM

Last updated: 10/29/2025, 9:28:42 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats