Skip to main content

CVE-2025-26711: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE T5400

Medium
VulnerabilityCVE-2025-26711cvecve-2025-26711cwe-200
Published: Tue Sep 16 2025 (09/16/2025, 09:35:38 UTC)
Source: CVE Database V5
Vendor/Project: ZTE
Product: T5400

Description

There is an unauthorized access vulnerability in ZTE T5400. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface.

AI-Powered Analysis

AILast updated: 09/16/2025, 09:41:52 UTC

Technical Analysis

CVE-2025-26711 is a medium-severity vulnerability identified in the ZTE T5400 product, specifically version CR_UNIAGT5400V1.0.0B02. The vulnerability arises from improper permission control in the Web module interface of the device. This flaw allows an unauthorized attacker, who has network access but requires low privileges (PR:L), to access sensitive information without user interaction. The vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The CVSS v3.1 base score is 5.7, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have similar access. The vulnerability does not impact integrity or availability but has a high impact on confidentiality, as sensitive data can be leaked. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability does not require user interaction, increasing the risk of automated or stealthy information disclosure. The ZTE T5400 is a telecommunications device, likely used in network infrastructure, which makes the exposure of sensitive information potentially impactful for network security and privacy.

Potential Impact

For European organizations, especially telecommunications providers and enterprises relying on ZTE network equipment, this vulnerability poses a risk of unauthorized disclosure of sensitive information. Such information could include configuration details, credentials, or network topology data, which attackers could leverage for further attacks or espionage. The exposure could undermine confidentiality, leading to potential data breaches or facilitating lateral movement within networks. Given the medium severity and the requirement for adjacent network access with low privileges, the threat is more pronounced in environments where network segmentation is weak or where attackers can gain local network access, such as through compromised devices or insider threats. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable. European telecom operators and critical infrastructure entities using ZTE T5400 devices could face increased risk of targeted reconnaissance or information leakage, potentially impacting privacy regulations compliance such as GDPR.

Mitigation Recommendations

Organizations should implement strict network segmentation to limit access to the ZTE T5400 management interfaces, ensuring that only authorized personnel and systems can reach the Web module interface. Employing strong access controls and monitoring for unusual access patterns on the device is critical. Since no patch is currently available, consider disabling or restricting the vulnerable Web module interface if operationally feasible. Use VPNs or secure management channels to access device interfaces, reducing exposure to adjacent network attackers. Regularly audit device configurations and logs for signs of unauthorized access attempts. Engage with ZTE support to obtain updates on patch availability and apply security updates promptly once released. Additionally, implement intrusion detection systems capable of identifying anomalous behavior related to device management interfaces. Finally, educate network administrators on the risks of this vulnerability and enforce strict credential management policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zte
Date Reserved
2025-02-14T06:13:41.901Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c930ca3d980629458048fa

Added to database: 9/16/2025, 9:41:30 AM

Last enriched: 9/16/2025, 9:41:52 AM

Last updated: 9/16/2025, 10:45:41 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats