Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0790: CWE-425: Direct Request ('Forced Browsing') in ALGO 8180 IP Audio Alerter

0
Medium
VulnerabilityCVE-2026-0790cvecve-2026-0790cwe-425
Published: Fri Jan 23 2026 (01/23/2026, 03:01:20 UTC)
Source: CVE Database V5
Vendor/Project: ALGO
Product: 8180 IP Audio Alerter

Description

CVE-2026-0790 is a medium severity vulnerability in the ALGO 8180 IP Audio Alerter device that allows unauthenticated remote attackers to disclose sensitive information via direct URL requests to the device's web UI. The flaw, categorized as CWE-425 (Direct Request or Forced Browsing), enables attackers to bypass authentication by directly accessing specific URLs, exposing data without user interaction. While no known exploits are currently active in the wild, the vulnerability affects version 5. 5 of the product and poses confidentiality risks. Exploitation requires no privileges or user interaction, but does not impact integrity or availability. European organizations using ALGO 8180 devices, particularly in sectors relying on IP audio alerting, should prioritize mitigation. No official patches are currently available, so network-level controls and monitoring are essential to reduce exposure.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:07:25 UTC

Technical Analysis

CVE-2026-0790 identifies a security weakness in the ALGO 8180 IP Audio Alerter, specifically within its web-based user interface. The vulnerability is classified under CWE-425, which involves direct request or forced browsing attacks. In this case, an attacker can craft a direct URL request to the device's web UI endpoints to access sensitive information without needing to authenticate. This bypass occurs because the application fails to properly enforce access controls on certain resources, allowing unauthorized disclosure of data. The vulnerability affects version 5.5 of the ALGO 8180 IP Audio Alerter and was publicly disclosed on January 23, 2026. The CVSS v3.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges, no user interaction, and impacts confidentiality only, without affecting integrity or availability. No patches or fixes have been published yet, and no active exploits have been reported in the wild. The vulnerability was assigned by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-28299. The nature of the device—used for IP audio alerting—means that sensitive operational or configuration data could be exposed, potentially aiding further attacks or reconnaissance.

Potential Impact

For European organizations, the primary impact of CVE-2026-0790 is the unauthorized disclosure of sensitive information from ALGO 8180 IP Audio Alerter devices. This could include configuration details, network information, or operational data that attackers could leverage for further intrusion or disruption. While the vulnerability does not directly compromise system integrity or availability, the confidentiality breach could facilitate lateral movement or targeted attacks within critical infrastructure environments. Organizations in sectors such as public safety, transportation, or facilities management that deploy these devices for alerting purposes may face increased risk of espionage or operational disruption. The lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of opportunistic scanning and exploitation attempts. Given the absence of known exploits in the wild, the immediate risk is moderate, but the exposure of sensitive data could have cascading effects on security posture and incident response.

Mitigation Recommendations

Since no official patches or updates are currently available for ALGO 8180 IP Audio Alerter version 5.5, European organizations should implement compensating controls to mitigate the risk. These include restricting network access to the device's management interface by placing it behind firewalls or VPNs, limiting access to trusted administrative networks only. Employ network segmentation to isolate the device from general user networks and the internet. Enable and monitor logging on the device and network perimeter to detect unusual direct URL access attempts indicative of forced browsing. Conduct regular vulnerability scans and penetration tests focusing on web UI endpoints to identify unauthorized access paths. Engage with ALGO support for any available firmware updates or workarounds. Additionally, consider deploying web application firewalls (WAFs) with rules to block suspicious URL patterns targeting the device. Finally, maintain an inventory of all ALGO 8180 devices in use and ensure that security policies reflect the need for strict access controls on these assets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:55:42.415Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972e91b4623b1157cde334d

Added to database: 1/23/2026, 3:20:59 AM

Last enriched: 1/30/2026, 10:07:25 AM

Last updated: 2/6/2026, 12:01:42 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats