CVE-2025-5379: Hard-coded Credentials in NuCom NC-WR744G
A vulnerability classified as critical was found in NuCom NC-WR744G 8.5.5 Build 20200530.307. This vulnerability affects unknown code of the component Console Application. The manipulation of the argument CMCCAdmin/useradmin/CUAdmin leads to hard-coded credentials. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5379 is a vulnerability identified in the NuCom NC-WR744G router, specifically version 8.5.5 Build 20200530.307. The issue arises from hard-coded credentials embedded within the Console Application component of the device's firmware. The vulnerability is triggered by manipulation of certain arguments, namely CMCCAdmin, useradmin, and CUAdmin, which correspond to privileged user accounts. Because these credentials are hard-coded and cannot be changed by the end user, an attacker can remotely exploit this flaw without requiring authentication or user interaction. The vulnerability allows an attacker to gain unauthorized access to the device's administrative interface, potentially enabling full control over the router. This could lead to interception or manipulation of network traffic, deployment of malicious configurations, or pivoting to other devices within the network. The vendor NuCom was notified early but has not responded or issued a patch, leaving the vulnerability unmitigated. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges, but in this context likely means no prior authentication), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. Despite the medium rating, the presence of hard-coded credentials accessible remotely is a significant security risk, especially in network infrastructure devices like routers that serve as gateways for enterprise networks.
Potential Impact
For European organizations, exploitation of this vulnerability could have serious consequences. The NC-WR744G router is used in various small to medium enterprise and possibly some industrial environments. Unauthorized access to the router could allow attackers to intercept sensitive communications, redirect traffic to malicious sites, or establish persistent footholds within corporate networks. This could lead to data breaches, intellectual property theft, or disruption of business operations. Given the router's role in network connectivity, attackers could also launch further attacks against internal systems. The lack of vendor response and patch availability increases the risk exposure. Organizations relying on this device may face compliance issues with GDPR if personal data confidentiality is compromised. Additionally, critical infrastructure sectors using these routers could experience operational disruptions. The medium CVSS score may underestimate the real-world risk due to the nature of hard-coded credentials enabling easy unauthorized access.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should take immediate compensating controls. First, identify all instances of the NuCom NC-WR744G routers running the affected firmware version. Replace these devices with models from vendors with active security support where feasible. If replacement is not immediately possible, isolate the affected routers from direct internet exposure by placing them behind firewalls or VPNs restricting access to trusted management networks only. Change default network configurations to limit management interface exposure. Monitor network traffic for unusual access patterns or unauthorized login attempts targeting these devices. Employ network segmentation to reduce the impact of a compromised router. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. Maintain strict logging and audit trails for router access. Finally, engage with NuCom or authorized resellers to demand security updates or firmware patches and stay informed about any future advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-5379: Hard-coded Credentials in NuCom NC-WR744G
Description
A vulnerability classified as critical was found in NuCom NC-WR744G 8.5.5 Build 20200530.307. This vulnerability affects unknown code of the component Console Application. The manipulation of the argument CMCCAdmin/useradmin/CUAdmin leads to hard-coded credentials. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5379 is a vulnerability identified in the NuCom NC-WR744G router, specifically version 8.5.5 Build 20200530.307. The issue arises from hard-coded credentials embedded within the Console Application component of the device's firmware. The vulnerability is triggered by manipulation of certain arguments, namely CMCCAdmin, useradmin, and CUAdmin, which correspond to privileged user accounts. Because these credentials are hard-coded and cannot be changed by the end user, an attacker can remotely exploit this flaw without requiring authentication or user interaction. The vulnerability allows an attacker to gain unauthorized access to the device's administrative interface, potentially enabling full control over the router. This could lead to interception or manipulation of network traffic, deployment of malicious configurations, or pivoting to other devices within the network. The vendor NuCom was notified early but has not responded or issued a patch, leaving the vulnerability unmitigated. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges, but in this context likely means no prior authentication), no user interaction (UI:N), and low impact on confidentiality (VC:L), with no impact on integrity or availability. Despite the medium rating, the presence of hard-coded credentials accessible remotely is a significant security risk, especially in network infrastructure devices like routers that serve as gateways for enterprise networks.
Potential Impact
For European organizations, exploitation of this vulnerability could have serious consequences. The NC-WR744G router is used in various small to medium enterprise and possibly some industrial environments. Unauthorized access to the router could allow attackers to intercept sensitive communications, redirect traffic to malicious sites, or establish persistent footholds within corporate networks. This could lead to data breaches, intellectual property theft, or disruption of business operations. Given the router's role in network connectivity, attackers could also launch further attacks against internal systems. The lack of vendor response and patch availability increases the risk exposure. Organizations relying on this device may face compliance issues with GDPR if personal data confidentiality is compromised. Additionally, critical infrastructure sectors using these routers could experience operational disruptions. The medium CVSS score may underestimate the real-world risk due to the nature of hard-coded credentials enabling easy unauthorized access.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should take immediate compensating controls. First, identify all instances of the NuCom NC-WR744G routers running the affected firmware version. Replace these devices with models from vendors with active security support where feasible. If replacement is not immediately possible, isolate the affected routers from direct internet exposure by placing them behind firewalls or VPNs restricting access to trusted management networks only. Change default network configurations to limit management interface exposure. Monitor network traffic for unusual access patterns or unauthorized login attempts targeting these devices. Employ network segmentation to reduce the impact of a compromised router. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. Maintain strict logging and audit trails for router access. Finally, engage with NuCom or authorized resellers to demand security updates or firmware patches and stay informed about any future advisories.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-30T11:34:52.148Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683b076b182aa0cae2e401e4
Added to database: 5/31/2025, 1:43:07 PM
Last enriched: 7/8/2025, 1:40:02 PM
Last updated: 8/11/2025, 7:04:40 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.