CVE-2025-57433: n/a
The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device.
AI Analysis
Technical Summary
CVE-2025-57433 is an information disclosure vulnerability affecting the web interface of the 2wcom IP-4c device, version 2.15.5. The vulnerability allows an authenticated attacker, even with low-privileged guest access, to send a specially crafted POST request to the endpoint /cwi/ajax_request/get_data.php. This request returns hashed passwords for the admin, manager, and guest accounts. The exposure of these password hashes significantly undermines the device's security because an attacker can perform offline cracking attempts against these hashes to recover plaintext credentials. Once the attacker obtains the admin or manager credentials, they can gain full administrative control over the device. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights a critical design flaw in the device's web interface, where sensitive credential hashes are accessible to low-privileged users, increasing the risk of privilege escalation and unauthorized device control.
Potential Impact
For European organizations using the 2wcom IP-4c device, this vulnerability poses a significant risk to network security and operational integrity. The ability for low-privileged users to extract hashed credentials can lead to unauthorized administrative access if hashes are cracked, potentially allowing attackers to manipulate device configurations, intercept or redirect network traffic, or disrupt communications. Given that 2wcom devices are often used in industrial and critical infrastructure environments such as utilities, transportation, and manufacturing, exploitation could lead to operational disruptions or data breaches. The confidentiality breach could also expose sensitive network configurations and user credentials, increasing the attack surface for lateral movement within corporate networks. The medium CVSS score reflects the need for prompt mitigation, especially in environments where these devices are exposed to untrusted networks or where guest accounts are widely accessible. The absence of known exploits suggests a window of opportunity for organizations to remediate before active exploitation occurs.
Mitigation Recommendations
1. Immediately restrict or disable guest and low-privileged accounts on the 2wcom IP-4c device to limit access to the web interface. 2. Implement network segmentation and firewall rules to restrict access to the device's management interface only to trusted administrative networks or VPNs. 3. Monitor and log all access attempts to the /cwi/ajax_request/get_data.php endpoint to detect suspicious POST requests indicative of exploitation attempts. 4. Enforce strong password policies and consider using multi-factor authentication if supported by the device to reduce the risk of credential compromise. 5. Regularly audit device firmware and software versions, and apply vendor patches or updates as soon as they become available. 6. If patching is not immediately possible, consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with custom rules to block or alert on suspicious POST requests targeting the vulnerable endpoint. 7. Educate administrators and users about the risks of credential exposure and the importance of limiting account privileges. 8. Conduct offline password hash audits to assess the strength of existing credentials and replace weak passwords promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-57433: n/a
Description
The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-57433 is an information disclosure vulnerability affecting the web interface of the 2wcom IP-4c device, version 2.15.5. The vulnerability allows an authenticated attacker, even with low-privileged guest access, to send a specially crafted POST request to the endpoint /cwi/ajax_request/get_data.php. This request returns hashed passwords for the admin, manager, and guest accounts. The exposure of these password hashes significantly undermines the device's security because an attacker can perform offline cracking attempts against these hashes to recover plaintext credentials. Once the attacker obtains the admin or manager credentials, they can gain full administrative control over the device. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.5 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality (C:H) but not integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights a critical design flaw in the device's web interface, where sensitive credential hashes are accessible to low-privileged users, increasing the risk of privilege escalation and unauthorized device control.
Potential Impact
For European organizations using the 2wcom IP-4c device, this vulnerability poses a significant risk to network security and operational integrity. The ability for low-privileged users to extract hashed credentials can lead to unauthorized administrative access if hashes are cracked, potentially allowing attackers to manipulate device configurations, intercept or redirect network traffic, or disrupt communications. Given that 2wcom devices are often used in industrial and critical infrastructure environments such as utilities, transportation, and manufacturing, exploitation could lead to operational disruptions or data breaches. The confidentiality breach could also expose sensitive network configurations and user credentials, increasing the attack surface for lateral movement within corporate networks. The medium CVSS score reflects the need for prompt mitigation, especially in environments where these devices are exposed to untrusted networks or where guest accounts are widely accessible. The absence of known exploits suggests a window of opportunity for organizations to remediate before active exploitation occurs.
Mitigation Recommendations
1. Immediately restrict or disable guest and low-privileged accounts on the 2wcom IP-4c device to limit access to the web interface. 2. Implement network segmentation and firewall rules to restrict access to the device's management interface only to trusted administrative networks or VPNs. 3. Monitor and log all access attempts to the /cwi/ajax_request/get_data.php endpoint to detect suspicious POST requests indicative of exploitation attempts. 4. Enforce strong password policies and consider using multi-factor authentication if supported by the device to reduce the risk of credential compromise. 5. Regularly audit device firmware and software versions, and apply vendor patches or updates as soon as they become available. 6. If patching is not immediately possible, consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with custom rules to block or alert on suspicious POST requests targeting the vulnerable endpoint. 7. Educate administrators and users about the risks of credential exposure and the importance of limiting account privileges. 8. Conduct offline password hash audits to assess the strength of existing credentials and replace weak passwords promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-17T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d17182eaa8a5844730ace7
Added to database: 9/22/2025, 3:55:46 PM
Last enriched: 9/30/2025, 12:53:55 AM
Last updated: 10/6/2025, 10:52:52 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43824: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-61768: CWE-20: Improper Input Validation in xuemian168 kuno
MediumCVE-2025-59452: CWE-340 Generation of Predictable Numbers or Identifiers in YoSmart YoLink API
MediumCVE-2025-59451: CWE-863 Incorrect Authorization in YoSmart YoLink application
LowCVE-2025-59450: CWE-312 Cleartext Storage of Sensitive Information in YoSmart YoLink Smart Hub
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.