CVE-2025-28371: n/a
EnGenius ENH500 AP 2T2R V3.0 FW3.7.22 is vulnerable to Incorrect Access Control via the password change function. The device fails to validate the current password, allowing an attacker to submit a password change request with an invalid current password and set a new password.
AI Analysis
Technical Summary
CVE-2025-28371 is a medium-severity vulnerability affecting the EnGenius ENH500 Access Point (AP) 2T2R V3.0 firmware version 3.7.22. The vulnerability arises from incorrect access control in the device's password change function. Specifically, the device fails to validate the current password when processing a password change request. This flaw allows an unauthenticated attacker to submit a password change request with an invalid or arbitrary current password and successfully set a new password. The vulnerability is classified under CWE-284 (Improper Access Control). The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). The vulnerability enables an attacker to gain control over the device by resetting the password without authentication, potentially allowing further unauthorized configuration changes or network access. No known exploits are reported in the wild at the time of publication (May 19, 2025), and no patches or vendor advisories have been linked yet. The vulnerability affects a widely deployed wireless access point model used in enterprise and possibly industrial or public network environments, making it a significant risk if exploited.
Potential Impact
For European organizations, this vulnerability poses a notable risk, especially for those deploying EnGenius ENH500 APs in their network infrastructure. Successful exploitation allows attackers to bypass authentication controls and change device passwords remotely over the network. This can lead to unauthorized administrative access, enabling attackers to alter network configurations, intercept or redirect traffic, or create persistent backdoors. The low confidentiality impact rating indicates limited direct data exposure, but the ability to control network infrastructure devices can indirectly compromise sensitive information and network integrity. Availability impact, although low, could manifest as service disruptions or denial of wireless connectivity if attackers misconfigure or disable the APs. Given the critical role of wireless access points in enterprise connectivity, this vulnerability could disrupt business operations, especially in sectors relying on wireless networks for critical communications. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the threat level. European organizations with remote or unmanaged deployments of affected APs are particularly vulnerable, as attackers can exploit the flaw without physical access or user involvement.
Mitigation Recommendations
Immediate mitigation steps include isolating affected EnGenius ENH500 APs from untrusted networks until a firmware update or patch is available. Network administrators should implement strict network segmentation to restrict access to management interfaces of wireless APs, ideally limiting access to trusted internal networks or VPNs. Enabling network-level authentication mechanisms such as 802.1X can reduce unauthorized access risks. Monitoring network traffic for unusual password change requests or configuration changes on APs can help detect exploitation attempts. Organizations should contact EnGenius support for official patches or firmware updates addressing this vulnerability and apply them promptly once released. As a temporary workaround, disabling remote management interfaces or changing default management ports may reduce exposure. Additionally, enforcing strong network perimeter defenses, including firewalls and intrusion detection/prevention systems, can help block unauthorized access attempts targeting these devices. Regular audits of wireless infrastructure configurations and access logs are recommended to identify suspicious activities early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Finland
CVE-2025-28371: n/a
Description
EnGenius ENH500 AP 2T2R V3.0 FW3.7.22 is vulnerable to Incorrect Access Control via the password change function. The device fails to validate the current password, allowing an attacker to submit a password change request with an invalid current password and set a new password.
AI-Powered Analysis
Technical Analysis
CVE-2025-28371 is a medium-severity vulnerability affecting the EnGenius ENH500 Access Point (AP) 2T2R V3.0 firmware version 3.7.22. The vulnerability arises from incorrect access control in the device's password change function. Specifically, the device fails to validate the current password when processing a password change request. This flaw allows an unauthenticated attacker to submit a password change request with an invalid or arbitrary current password and successfully set a new password. The vulnerability is classified under CWE-284 (Improper Access Control). The CVSS 3.1 base score is 6.5, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). The vulnerability enables an attacker to gain control over the device by resetting the password without authentication, potentially allowing further unauthorized configuration changes or network access. No known exploits are reported in the wild at the time of publication (May 19, 2025), and no patches or vendor advisories have been linked yet. The vulnerability affects a widely deployed wireless access point model used in enterprise and possibly industrial or public network environments, making it a significant risk if exploited.
Potential Impact
For European organizations, this vulnerability poses a notable risk, especially for those deploying EnGenius ENH500 APs in their network infrastructure. Successful exploitation allows attackers to bypass authentication controls and change device passwords remotely over the network. This can lead to unauthorized administrative access, enabling attackers to alter network configurations, intercept or redirect traffic, or create persistent backdoors. The low confidentiality impact rating indicates limited direct data exposure, but the ability to control network infrastructure devices can indirectly compromise sensitive information and network integrity. Availability impact, although low, could manifest as service disruptions or denial of wireless connectivity if attackers misconfigure or disable the APs. Given the critical role of wireless access points in enterprise connectivity, this vulnerability could disrupt business operations, especially in sectors relying on wireless networks for critical communications. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the threat level. European organizations with remote or unmanaged deployments of affected APs are particularly vulnerable, as attackers can exploit the flaw without physical access or user involvement.
Mitigation Recommendations
Immediate mitigation steps include isolating affected EnGenius ENH500 APs from untrusted networks until a firmware update or patch is available. Network administrators should implement strict network segmentation to restrict access to management interfaces of wireless APs, ideally limiting access to trusted internal networks or VPNs. Enabling network-level authentication mechanisms such as 802.1X can reduce unauthorized access risks. Monitoring network traffic for unusual password change requests or configuration changes on APs can help detect exploitation attempts. Organizations should contact EnGenius support for official patches or firmware updates addressing this vulnerability and apply them promptly once released. As a temporary workaround, disabling remote management interfaces or changing default management ports may reduce exposure. Additionally, enforcing strong network perimeter defenses, including firewalls and intrusion detection/prevention systems, can help block unauthorized access attempts targeting these devices. Regular audits of wireless infrastructure configurations and access logs are recommended to identify suspicious activities early.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb589
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:33:35 PM
Last updated: 8/18/2025, 8:03:36 AM
Views: 15
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.