Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12386: CWE-306 Missing Authentication for Critical Function in Pix-Link LV-WR21Q

0
Medium
VulnerabilityCVE-2025-12386cvecve-2025-12386cwe-306
Published: Tue Jan 27 2026 (01/27/2026, 11:57:50 UTC)
Source: CVE Database V5
Vendor/Project: Pix-Link
Product: LV-WR21Q

Description

Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

AI-Powered Analysis

AILast updated: 01/27/2026, 12:20:26 UTC

Technical Analysis

CVE-2025-12386 identifies a critical security flaw in the Pix-Link LV-WR21Q wireless access point, where the device's endpoint /goform/getHomePageInfo lacks any authentication mechanism. This endpoint can be accessed remotely by an unauthenticated attacker to retrieve sensitive configuration data, including the device's cleartext password. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function), indicating a failure to restrict access to sensitive functions. The confirmed affected firmware version is V108_108, though other versions have not been tested and may also be vulnerable. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality (VC:L) but not integrity or availability. The vendor was notified but has not provided detailed information or patches. This flaw allows attackers to extract credentials remotely, potentially enabling unauthorized access to the wireless network and further lateral movement or data exfiltration. The lack of authentication on a critical endpoint represents a significant security oversight, especially for devices deployed in enterprise or sensitive environments.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to wireless networks, compromising the confidentiality of internal communications and potentially allowing attackers to intercept or manipulate network traffic. The exposure of cleartext passwords increases the risk of credential theft and unauthorized device control. This can facilitate further attacks such as network reconnaissance, man-in-the-middle attacks, or pivoting into internal systems. Organizations relying on Pix-Link LV-WR21Q devices, especially in critical infrastructure, government, or corporate environments, may face operational disruptions, data breaches, and reputational damage. The vulnerability's remote and unauthenticated nature lowers the barrier for attackers, increasing the likelihood of exploitation if devices are exposed to untrusted networks or the internet. Additionally, the absence of vendor patches or guidance complicates remediation efforts, potentially prolonging exposure.

Mitigation Recommendations

European organizations should immediately inventory their network infrastructure to identify any Pix-Link LV-WR21Q devices, particularly those running firmware version V108_108. Until a vendor patch is available, restrict network access to these devices by implementing network segmentation and firewall rules that limit access to management interfaces only to trusted administrative hosts. Disable remote management features if not required, and ensure that devices are not exposed directly to the internet. Monitor network traffic for unusual access attempts to the /goform/getHomePageInfo endpoint. Consider replacing vulnerable devices with alternatives from vendors with active security support if remediation is not feasible. Additionally, enforce strong network access controls and implement multi-factor authentication on network entry points to mitigate the risk of compromised credentials. Regularly update device firmware when vendor patches become available and maintain communication with Pix-Link for security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-10-28T12:02:30.410Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6978aa244623b1157c209813

Added to database: 1/27/2026, 12:05:56 PM

Last enriched: 1/27/2026, 12:20:26 PM

Last updated: 1/28/2026, 1:56:49 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats