Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26062: n/a

0
Critical
VulnerabilityCVE-2025-26062cvecve-2025-26062
Published: Thu Jul 31 2025 (07/31/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain potentially sensitive information from the current settings.

AI-Powered Analysis

AILast updated: 11/04/2025, 02:24:31 UTC

Technical Analysis

CVE-2025-26062 is an access control vulnerability identified in Intelbras RX1500 version 2.2.9 and RX3000 version 1.0.11 routers. The flaw allows unauthenticated attackers to retrieve the router's settings file without any credentials or user interaction. This settings file likely contains sensitive information such as network configurations, passwords, and possibly VPN or firewall rules. The vulnerability stems from improper access control mechanisms (CWE-284), which fail to restrict access to critical configuration files. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of remote exploitation over the network (AV:N), no privileges required (PR:N), and no user interaction needed (UI:N). Although no public exploits have been reported yet, the exposure of router settings can enable attackers to manipulate network traffic, intercept communications, or pivot to internal systems. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls. This vulnerability is particularly dangerous because routers serve as the network perimeter, and compromise can lead to widespread network infiltration.

Potential Impact

For European organizations, exploitation of CVE-2025-26062 could result in severe consequences including unauthorized disclosure of sensitive network configurations, credential theft, and potential full network compromise. Attackers gaining access to router settings can alter firewall rules, redirect traffic, or disable security features, undermining the entire network's security posture. Critical infrastructure operators, enterprises, and government agencies relying on Intelbras RX1500 and RX3000 routers may face operational disruptions, data breaches, and compliance violations under GDPR. The exposure of sensitive configuration data could also facilitate further attacks such as man-in-the-middle, ransomware deployment, or espionage. Given the routers' role as network gateways, the vulnerability could be exploited to establish persistent footholds within organizational networks, increasing the risk of long-term compromise and data exfiltration.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Intelbras RX1500 and RX3000 routers from untrusted networks and restricting access to management interfaces to trusted internal IP addresses only. Network administrators should monitor router logs for unusual access attempts and implement network segmentation to limit potential lateral movement. Since no patches are currently available, organizations should engage with Intelbras support to obtain firmware updates or advisories. Employing strong network perimeter defenses such as firewalls and intrusion detection/prevention systems can help detect and block exploitation attempts. Additionally, organizations should conduct thorough audits of router configurations and credentials, changing default passwords and disabling unnecessary services. Planning for rapid deployment of firmware updates once released is critical. Finally, organizations should consider alternative hardware or vendors if timely patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-02-07T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688bbde8ad5a09ad00bba873

Added to database: 7/31/2025, 7:03:04 PM

Last enriched: 11/4/2025, 2:24:31 AM

Last updated: 11/30/2025, 1:13:53 PM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats