Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13954: CWE-798 Use of Hard-coded Credentials in EZCast EZCast Pro II

0
Critical
VulnerabilityCVE-2025-13954cvecve-2025-13954cwe-798
Published: Wed Dec 10 2025 (12/10/2025, 08:29:51 UTC)
Source: CVE Database V5
Vendor/Project: EZCast
Product: EZCast Pro II

Description

Hard-coded cryptographic keys in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI

AI-Powered Analysis

AILast updated: 12/17/2025, 09:27:22 UTC

Technical Analysis

CVE-2025-13954 identifies a critical security vulnerability in the EZCast Pro II device, specifically version 1.17478.146. The root cause is the presence of hard-coded cryptographic keys embedded within the Admin UI, classified under CWE-798 (Use of Hard-coded Credentials). These hard-coded keys allow attackers to bypass all authorization checks, granting them full administrative privileges without requiring any authentication or user interaction. The vulnerability can be exploited remotely with low attack complexity, as indicated by the CVSS 4.0 vector: Attack Vector (AV) is adjacent network, Attack Complexity (AC) is low, and no privileges or user interaction are required. The impact on confidentiality, integrity, and availability is high, as attackers can fully control the device, potentially altering configurations, intercepting or manipulating data streams, or disrupting device functionality. EZCast Pro II devices are commonly used for wireless presentation and collaboration in enterprise and educational environments, making this vulnerability particularly concerning for organizations relying on secure communication and data sharing. No patches or firmware updates have been published yet, and no known exploits have been observed in the wild, but the critical severity demands immediate attention. The vulnerability was assigned and published by NCSC.ch, reflecting its recognized importance in the cybersecurity community.

Potential Impact

For European organizations, the exploitation of CVE-2025-13954 could lead to unauthorized administrative control over EZCast Pro II devices, resulting in potential data breaches, manipulation of presentation content, and disruption of collaborative workflows. Confidential information transmitted or displayed via these devices could be intercepted or altered, undermining trust and compliance with data protection regulations such as GDPR. The integrity of meetings and presentations could be compromised, affecting decision-making processes and operational continuity. Availability of the devices may also be impacted if attackers disable or misconfigure the hardware. Sectors such as government, finance, education, and large enterprises that utilize EZCast Pro II for secure communication are at heightened risk. The vulnerability's ease of exploitation and lack of required authentication amplify the threat, potentially enabling lateral movement within networks if attackers leverage compromised devices as footholds.

Mitigation Recommendations

Given the absence of published patches, European organizations should immediately implement network-level mitigations. These include isolating EZCast Pro II devices on dedicated VLANs with strict access controls, limiting network exposure to trusted management hosts only. Employ network monitoring to detect anomalous access patterns to the Admin UI. Disable or restrict remote management interfaces where possible. Enforce strong physical security to prevent local exploitation. Engage with EZCast vendors to obtain firmware updates or patches addressing the hard-coded credential issue. Consider replacing affected devices if no timely fix is available. Additionally, conduct regular audits of device configurations and access logs to identify unauthorized access attempts. Incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NCSC.ch
Date Reserved
2025-12-03T13:26:03.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69393610fd479f45ea55244b

Added to database: 12/10/2025, 8:57:52 AM

Last enriched: 12/17/2025, 9:27:22 AM

Last updated: 2/6/2026, 2:06:56 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats