Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24455: CWE-319 in Jinan USR IOT Technology Limited (PUSR) USR-W610

0
High
VulnerabilityCVE-2026-24455cvecve-2026-24455cwe-319
Published: Fri Feb 20 2026 (02/20/2026, 16:00:42 UTC)
Source: CVE Database V5
Vendor/Project: Jinan USR IOT Technology Limited (PUSR)
Product: USR-W610

Description

The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.

AI-Powered Analysis

AILast updated: 02/20/2026, 20:29:02 UTC

Technical Analysis

CVE-2026-24455 identifies a critical security weakness in the USR-W610 device manufactured by Jinan USR IOT Technology Limited. The core issue is the absence of HTTPS/TLS support on the device's embedded web interface, which relies solely on HTTP Basic Authentication. While the authentication data is encoded (likely Base64), it is not encrypted, making it trivial for an attacker with network access to intercept and decode user credentials. This vulnerability falls under CWE-319, which pertains to the cleartext transmission of sensitive information. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality (C:H) but not integrity or availability. The device’s firmware version 0 is affected, and no patches have been published yet. The vulnerability is particularly concerning in local network environments where attackers can sniff traffic, such as unsecured Wi-Fi or compromised LAN segments. The lack of encryption means that any attacker on the same network segment can capture login credentials, potentially leading to unauthorized access and further exploitation. Although no exploits are known in the wild, the ease of exploitation and the critical nature of credential exposure warrant immediate attention.

Potential Impact

The primary impact of this vulnerability is the compromise of user credentials through passive network interception, leading to unauthorized access to the device’s management interface. This can result in attackers gaining control over the device, potentially manipulating its functions or using it as a foothold for lateral movement within the network. Since the vulnerability does not affect integrity or availability directly, the immediate risk is confidentiality loss. However, once credentials are compromised, attackers could alter device configurations or disrupt services, indirectly impacting integrity and availability. Organizations deploying these devices in sensitive environments, such as industrial control systems, smart buildings, or critical infrastructure, face heightened risks of espionage, sabotage, or data breaches. The vulnerability’s exploitation could undermine trust in IoT deployments and lead to regulatory or compliance issues, especially where data protection laws mandate secure authentication mechanisms.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first isolate the USR-W610 devices on segmented networks with strict access controls to limit exposure to untrusted users. Employing VPNs or secure tunnels can encrypt traffic between administrators and the device, compensating for the lack of native HTTPS/TLS support. Network monitoring and intrusion detection systems should be configured to detect suspicious sniffing or unauthorized access attempts. Where possible, replace affected devices with models supporting secure authentication protocols such as HTTPS with TLS. If replacement is not immediately feasible, enforce strong, unique passwords and change them regularly to reduce the risk from intercepted credentials. Additionally, vendors should be engaged to prioritize firmware updates that implement HTTPS/TLS support and stronger authentication mechanisms. Finally, educating network administrators about the risks of using devices without encrypted management interfaces is essential to prevent inadvertent exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-10T15:52:10.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c0ac2c4d84f260ce40b1

Added to database: 2/20/2026, 8:14:36 PM

Last enriched: 2/20/2026, 8:29:02 PM

Last updated: 2/20/2026, 10:58:00 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats