CVE-2025-12386: CWE-306 Missing Authentication for Critical Function in Pix-Link LV-WR21Q
Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI Analysis
Technical Summary
CVE-2025-12386 identifies a critical security flaw in the Pix-Link LV-WR21Q wireless access point, where the device's endpoint /goform/getHomePageInfo lacks any authentication mechanism. This endpoint can be accessed remotely by an unauthenticated attacker to retrieve sensitive configuration data, including the device's cleartext password. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function), indicating a failure to restrict access to sensitive functions. The confirmed affected firmware version is V108_108, though other versions have not been tested and may also be vulnerable. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality (VC:L) but not integrity or availability. The vendor was notified but has not provided detailed information or patches. This flaw allows attackers to extract credentials remotely, potentially enabling unauthorized access to the wireless network and further lateral movement or data exfiltration. The lack of authentication on a critical endpoint represents a significant security oversight, especially for devices deployed in enterprise or sensitive environments.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to wireless networks, compromising the confidentiality of internal communications and potentially allowing attackers to intercept or manipulate network traffic. The exposure of cleartext passwords increases the risk of credential theft and unauthorized device control. This can facilitate further attacks such as network reconnaissance, man-in-the-middle attacks, or pivoting into internal systems. Organizations relying on Pix-Link LV-WR21Q devices, especially in critical infrastructure, government, or corporate environments, may face operational disruptions, data breaches, and reputational damage. The vulnerability's remote and unauthenticated nature lowers the barrier for attackers, increasing the likelihood of exploitation if devices are exposed to untrusted networks or the internet. Additionally, the absence of vendor patches or guidance complicates remediation efforts, potentially prolonging exposure.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify any Pix-Link LV-WR21Q devices, particularly those running firmware version V108_108. Until a vendor patch is available, restrict network access to these devices by implementing network segmentation and firewall rules that limit access to management interfaces only to trusted administrative hosts. Disable remote management features if not required, and ensure that devices are not exposed directly to the internet. Monitor network traffic for unusual access attempts to the /goform/getHomePageInfo endpoint. Consider replacing vulnerable devices with alternatives from vendors with active security support if remediation is not feasible. Additionally, enforce strong network access controls and implement multi-factor authentication on network entry points to mitigate the risk of compromised credentials. Regularly update device firmware when vendor patches become available and maintain communication with Pix-Link for security advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-12386: CWE-306 Missing Authentication for Critical Function in Pix-Link LV-WR21Q
Description
Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
AI-Powered Analysis
Technical Analysis
CVE-2025-12386 identifies a critical security flaw in the Pix-Link LV-WR21Q wireless access point, where the device's endpoint /goform/getHomePageInfo lacks any authentication mechanism. This endpoint can be accessed remotely by an unauthenticated attacker to retrieve sensitive configuration data, including the device's cleartext password. The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function), indicating a failure to restrict access to sensitive functions. The confirmed affected firmware version is V108_108, though other versions have not been tested and may also be vulnerable. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality (VC:L) but not integrity or availability. The vendor was notified but has not provided detailed information or patches. This flaw allows attackers to extract credentials remotely, potentially enabling unauthorized access to the wireless network and further lateral movement or data exfiltration. The lack of authentication on a critical endpoint represents a significant security oversight, especially for devices deployed in enterprise or sensitive environments.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized access to wireless networks, compromising the confidentiality of internal communications and potentially allowing attackers to intercept or manipulate network traffic. The exposure of cleartext passwords increases the risk of credential theft and unauthorized device control. This can facilitate further attacks such as network reconnaissance, man-in-the-middle attacks, or pivoting into internal systems. Organizations relying on Pix-Link LV-WR21Q devices, especially in critical infrastructure, government, or corporate environments, may face operational disruptions, data breaches, and reputational damage. The vulnerability's remote and unauthenticated nature lowers the barrier for attackers, increasing the likelihood of exploitation if devices are exposed to untrusted networks or the internet. Additionally, the absence of vendor patches or guidance complicates remediation efforts, potentially prolonging exposure.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify any Pix-Link LV-WR21Q devices, particularly those running firmware version V108_108. Until a vendor patch is available, restrict network access to these devices by implementing network segmentation and firewall rules that limit access to management interfaces only to trusted administrative hosts. Disable remote management features if not required, and ensure that devices are not exposed directly to the internet. Monitor network traffic for unusual access attempts to the /goform/getHomePageInfo endpoint. Consider replacing vulnerable devices with alternatives from vendors with active security support if remediation is not feasible. Additionally, enforce strong network access controls and implement multi-factor authentication on network entry points to mitigate the risk of compromised credentials. Regularly update device firmware when vendor patches become available and maintain communication with Pix-Link for security advisories.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-10-28T12:02:30.410Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6978aa244623b1157c209813
Added to database: 1/27/2026, 12:05:56 PM
Last enriched: 1/27/2026, 12:20:26 PM
Last updated: 1/28/2026, 1:56:49 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14795: CWE-352 Cross-Site Request Forgery (CSRF) in webguyio Stop Spammers Classic
MediumCVE-2026-1056: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in inc2734 Snow Monkey Forms
CriticalCVE-2025-14865: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Passster – Password Protect Pages and Content
MediumCVE-2025-59894: CWE-352 Cross-Site Request Forgery (CSRF) in Flexense Sync Breeze Enterprise Server
HighCVE-2025-59893: CWE-352 Cross-Site Request Forgery (CSRF) in Flexense Sync Breeze Enterprise Server
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.