CVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface
AI Analysis
Technical Summary
CVE-2025-26709 is a medium-severity vulnerability affecting the ZTE F50 device, specifically version F50_FLYMODEM_ZYV1.0.0B07. The vulnerability arises from improper permission control in the web module interface of the device, which allows an unauthorized attacker to access sensitive information without proper authorization. This is classified under CWE-200, indicating exposure of sensitive information to an unauthorized actor. The vulnerability does not require user interaction but does require adjacent network access (AV:A) and low attack complexity (AC:L). However, it requires low privileges (PR:L), meaning an attacker must have some limited access to the network or device environment but not full administrative rights. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability (I:N, A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The ZTE F50 is typically used in telecommunications infrastructure, often as a modem or network access device, which makes the exposure of sensitive information potentially impactful in network security contexts. The vulnerability's medium CVSS score of 5.7 reflects the moderate risk posed by the ability to leak sensitive data without full authentication but requiring some level of access to the device's network environment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information from ZTE F50 devices deployed within their network infrastructure. This could include configuration details, network credentials, or other sensitive operational data that could be leveraged for further attacks such as network intrusion, lateral movement, or espionage. Telecommunications providers, enterprises using ZTE F50 devices for connectivity, and critical infrastructure operators could be particularly impacted. The exposure of sensitive information could undermine confidentiality and trust, potentially leading to regulatory compliance issues under GDPR if personal data is involved. Although the vulnerability does not directly impact system integrity or availability, the information leakage could facilitate more severe attacks. Given the requirement for adjacent network access and low privileges, attackers would likely need to be within the local network or have limited access, which somewhat limits the attack surface but does not eliminate risk, especially in complex or segmented network environments.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Conduct an immediate inventory of all ZTE F50 devices, specifically identifying those running the affected version F50_FLYMODEM_ZYV1.0.0B07. 2) Restrict access to the web module interface by implementing strict network segmentation and access control lists (ACLs) to limit access only to trusted management hosts. 3) Monitor network traffic for unusual access attempts to the web interface, employing intrusion detection systems (IDS) tuned to detect unauthorized access patterns. 4) Engage with ZTE or authorized vendors to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5) If patches are unavailable, consider temporary compensating controls such as disabling the vulnerable web interface if feasible or deploying web application firewalls (WAF) to filter unauthorized requests. 6) Regularly review and update device configurations to ensure minimal exposure of sensitive interfaces. 7) Train network administrators on the risks associated with device management interfaces and enforce strong authentication and authorization policies for device access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
Description
There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface
AI-Powered Analysis
Technical Analysis
CVE-2025-26709 is a medium-severity vulnerability affecting the ZTE F50 device, specifically version F50_FLYMODEM_ZYV1.0.0B07. The vulnerability arises from improper permission control in the web module interface of the device, which allows an unauthorized attacker to access sensitive information without proper authorization. This is classified under CWE-200, indicating exposure of sensitive information to an unauthorized actor. The vulnerability does not require user interaction but does require adjacent network access (AV:A) and low attack complexity (AC:L). However, it requires low privileges (PR:L), meaning an attacker must have some limited access to the network or device environment but not full administrative rights. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability (I:N, A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The ZTE F50 is typically used in telecommunications infrastructure, often as a modem or network access device, which makes the exposure of sensitive information potentially impactful in network security contexts. The vulnerability's medium CVSS score of 5.7 reflects the moderate risk posed by the ability to leak sensitive data without full authentication but requiring some level of access to the device's network environment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information from ZTE F50 devices deployed within their network infrastructure. This could include configuration details, network credentials, or other sensitive operational data that could be leveraged for further attacks such as network intrusion, lateral movement, or espionage. Telecommunications providers, enterprises using ZTE F50 devices for connectivity, and critical infrastructure operators could be particularly impacted. The exposure of sensitive information could undermine confidentiality and trust, potentially leading to regulatory compliance issues under GDPR if personal data is involved. Although the vulnerability does not directly impact system integrity or availability, the information leakage could facilitate more severe attacks. Given the requirement for adjacent network access and low privileges, attackers would likely need to be within the local network or have limited access, which somewhat limits the attack surface but does not eliminate risk, especially in complex or segmented network environments.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Conduct an immediate inventory of all ZTE F50 devices, specifically identifying those running the affected version F50_FLYMODEM_ZYV1.0.0B07. 2) Restrict access to the web module interface by implementing strict network segmentation and access control lists (ACLs) to limit access only to trusted management hosts. 3) Monitor network traffic for unusual access attempts to the web interface, employing intrusion detection systems (IDS) tuned to detect unauthorized access patterns. 4) Engage with ZTE or authorized vendors to obtain security patches or firmware updates addressing this vulnerability as soon as they become available. 5) If patches are unavailable, consider temporary compensating controls such as disabling the vulnerable web interface if feasible or deploying web application firewalls (WAF) to filter unauthorized requests. 6) Regularly review and update device configurations to ensure minimal exposure of sensitive interfaces. 7) Train network administrators on the risks associated with device management interfaces and enforce strong authentication and authorization policies for device access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2025-02-14T06:13:41.901Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689f1055ad5a09ad006b3940
Added to database: 8/15/2025, 10:47:49 AM
Last enriched: 8/15/2025, 11:03:11 AM
Last updated: 8/15/2025, 12:02:49 PM
Views: 3
Related Threats
CVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumCVE-2025-54989: CWE-476: NULL Pointer Dereference in FirebirdSQL firebird
MediumCVE-2025-24975: CWE-754: Improper Check for Unusual or Exceptional Conditions in FirebirdSQL firebird
HighCVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighCVE-2025-5047: CWE-457: Use of Uninitialized Variable in Autodesk AutoCAD
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.