CVE-2025-26711: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE T5400
There is an unauthorized access vulnerability in ZTE T5400. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface.
AI Analysis
Technical Summary
CVE-2025-26711 is a medium-severity vulnerability identified in the ZTE T5400 product, specifically version CR_UNIAGT5400V1.0.0B02. The vulnerability arises from improper permission control in the Web module interface of the device. This flaw allows an unauthorized attacker, who has network access but requires low privileges (PR:L), to access sensitive information without user interaction. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 5.7, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have similar access. The vulnerability does not impact integrity or availability but has a high impact on confidentiality, as sensitive data can be leaked. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability does not require user interaction, increasing the risk of automated or stealthy information disclosure. The ZTE T5400 is a telecommunications device, likely used in network infrastructure, which makes the exposure of sensitive information potentially impactful for network security and privacy.
Potential Impact
For European organizations, especially telecommunications providers and enterprises relying on ZTE network equipment, this vulnerability poses a risk of unauthorized disclosure of sensitive information. Such information could include configuration details, credentials, or network topology data, which attackers could leverage for further attacks or espionage. The exposure could undermine confidentiality, leading to potential data breaches or facilitating lateral movement within networks. Given the medium severity and the requirement for adjacent network access with low privileges, the threat is more pronounced in environments where network segmentation is weak or where attackers can gain local network access, such as through compromised devices or insider threats. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. European telecom operators and critical infrastructure entities using ZTE T5400 devices could face increased risk of targeted reconnaissance or information leakage, potentially impacting privacy regulations compliance such as GDPR.
Mitigation Recommendations
Organizations should implement strict network segmentation to limit access to the ZTE T5400 management interfaces, ensuring that only authorized personnel and systems can reach the Web module interface. Employing strong access controls and monitoring for unusual access patterns on the device is critical. Since no patch is currently available, consider disabling or restricting the vulnerable Web module interface if operationally feasible. Use VPNs or secure management channels to access device interfaces, reducing exposure to adjacent network attackers. Regularly audit device configurations and logs for signs of unauthorized access attempts. Engage with ZTE support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement intrusion detection systems capable of identifying anomalous behavior related to device management interfaces. Finally, educate network administrators on the risks of this vulnerability and enforce strict credential management policies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-26711: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE T5400
Description
There is an unauthorized access vulnerability in ZTE T5400. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-26711 is a medium-severity vulnerability identified in the ZTE T5400 product, specifically version CR_UNIAGT5400V1.0.0B02. The vulnerability arises from improper permission control in the Web module interface of the device. This flaw allows an unauthorized attacker, who has network access but requires low privileges (PR:L), to access sensitive information without user interaction. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 5.7, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have similar access. The vulnerability does not impact integrity or availability but has a high impact on confidentiality, as sensitive data can be leaked. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability does not require user interaction, increasing the risk of automated or stealthy information disclosure. The ZTE T5400 is a telecommunications device, likely used in network infrastructure, which makes the exposure of sensitive information potentially impactful for network security and privacy.
Potential Impact
For European organizations, especially telecommunications providers and enterprises relying on ZTE network equipment, this vulnerability poses a risk of unauthorized disclosure of sensitive information. Such information could include configuration details, credentials, or network topology data, which attackers could leverage for further attacks or espionage. The exposure could undermine confidentiality, leading to potential data breaches or facilitating lateral movement within networks. Given the medium severity and the requirement for adjacent network access with low privileges, the threat is more pronounced in environments where network segmentation is weak or where attackers can gain local network access, such as through compromised devices or insider threats. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. European telecom operators and critical infrastructure entities using ZTE T5400 devices could face increased risk of targeted reconnaissance or information leakage, potentially impacting privacy regulations compliance such as GDPR.
Mitigation Recommendations
Organizations should implement strict network segmentation to limit access to the ZTE T5400 management interfaces, ensuring that only authorized personnel and systems can reach the Web module interface. Employing strong access controls and monitoring for unusual access patterns on the device is critical. Since no patch is currently available, consider disabling or restricting the vulnerable Web module interface if operationally feasible. Use VPNs or secure management channels to access device interfaces, reducing exposure to adjacent network attackers. Regularly audit device configurations and logs for signs of unauthorized access attempts. Engage with ZTE support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement intrusion detection systems capable of identifying anomalous behavior related to device management interfaces. Finally, educate network administrators on the risks of this vulnerability and enforce strict credential management policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zte
- Date Reserved
- 2025-02-14T06:13:41.901Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c930ca3d980629458048fa
Added to database: 9/16/2025, 9:41:30 AM
Last enriched: 9/16/2025, 9:41:52 AM
Last updated: 10/30/2025, 12:32:56 PM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCanada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
Critical136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.