Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-44614: n/a

0
High
VulnerabilityCVE-2025-44614cvecve-2025-44614
Published: Fri May 30 2025 (05/30/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensitive information, including credentials and mobile phone numbers, in plaintext.

AI-Powered Analysis

AILast updated: 07/07/2025, 20:27:52 UTC

Technical Analysis

CVE-2025-44614 is a high-severity vulnerability affecting the Tinxy WiFi Lock Controller v1 RF. The core issue is the storage of sensitive user information, including credentials and mobile phone numbers, in plaintext. This vulnerability corresponds to CWE-312, which denotes the cleartext storage of sensitive information. Because the data is stored without encryption or adequate protection, an attacker who gains access to the device's storage or backup data can easily extract this sensitive information. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N shows that the vulnerability can be exploited remotely over the network without any privileges or user interaction, and it results in a complete confidentiality breach (high confidentiality impact) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The lack of vendor or product details limits the ability to pinpoint exact affected models or firmware versions, but the vulnerability is specific to the Tinxy WiFi Lock Controller v1 RF device. This device likely manages access control via WiFi and radio frequency communication, making it a critical component in physical security systems. The plaintext storage of credentials and phone numbers could allow attackers to impersonate users, intercept or manipulate access control, or conduct targeted social engineering attacks.

Potential Impact

For European organizations, especially those relying on Tinxy WiFi Lock Controllers for physical access management, this vulnerability poses a significant risk. The exposure of credentials and phone numbers can lead to unauthorized physical access to sensitive facilities, data centers, or restricted areas, potentially resulting in theft, espionage, or sabotage. Confidentiality breaches of user credentials also increase the risk of lateral attacks within the organization's network if the same credentials are reused or if attackers leverage the information for phishing campaigns. The lack of integrity and availability impact means the device's operation might not be directly disrupted, but the confidentiality compromise alone can have severe consequences. Organizations in sectors such as finance, government, healthcare, and critical infrastructure in Europe are particularly vulnerable due to the sensitive nature of their physical security. Additionally, the remote exploitability without authentication or user interaction increases the attack surface and urgency for mitigation.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately assess their deployment of Tinxy WiFi Lock Controller v1 RF devices. Practical mitigation steps include: 1) Isolate the affected devices on segmented, secured networks to limit remote access exposure. 2) Implement strict network access controls and monitor network traffic for unusual activity targeting these devices. 3) Change all credentials associated with the devices and enforce strong, unique passwords. 4) If possible, disable remote management features until a patch is available. 5) Employ additional physical security controls as a compensating measure, such as manual locks or alternative authentication methods. 6) Engage with the vendor or supplier to obtain timelines for patches or firmware updates and request secure storage practices. 7) Conduct regular audits of device configurations and stored data to detect any unauthorized access. 8) Educate users about the risks of credential exposure and train them to recognize phishing attempts that could leverage leaked phone numbers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683917fc182aa0cae299e9e1

Added to database: 5/30/2025, 2:29:16 AM

Last enriched: 7/7/2025, 8:27:52 PM

Last updated: 11/19/2025, 9:00:46 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats