Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24789: CWE-306 in ZLAN Information Technology Co. ZLAN5143D

0
Critical
VulnerabilityCVE-2026-24789cvecve-2026-24789cwe-306
Published: Wed Feb 11 2026 (02/11/2026, 16:17:19 UTC)
Source: CVE Database V5
Vendor/Project: ZLAN Information Technology Co.
Product: ZLAN5143D

Description

An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.

AI-Powered Analysis

AILast updated: 02/11/2026, 17:00:58 UTC

Technical Analysis

CVE-2026-24789 is a critical security vulnerability identified in the ZLAN5143D device produced by ZLAN Information Technology Co., specifically affecting version v1.600. The vulnerability is classified under CWE-306, which refers to the lack of proper authentication mechanisms. The core issue is an unprotected API endpoint that allows an attacker to remotely change the device’s password without requiring any form of authentication, user interaction, or privileges. This means that an attacker with network access to the device can completely take control by resetting the password, effectively bypassing all security controls. The vulnerability has a CVSS 3.1 base score of 9.8, reflecting its critical nature with high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality (C:H), integrity (I:H), and availability (A:H) is high. This vulnerability could allow attackers to gain unauthorized administrative access, modify device configurations, disrupt services, or use the device as a foothold for further network compromise. No patches or fixes have been published yet, and no exploits are currently known in the wild, but the vulnerability’s nature makes it highly exploitable once discovered. The device’s role in network infrastructure means exploitation could have cascading effects on connected systems.

Potential Impact

For European organizations, the impact of CVE-2026-24789 is significant. The ability to remotely change device passwords without authentication can lead to full device compromise, resulting in unauthorized access to sensitive network segments. This can cause disruption of services, data breaches, and potential lateral movement within enterprise networks. Critical infrastructure sectors such as energy, telecommunications, and manufacturing that rely on ZLAN5143D devices for network connectivity or control could face operational outages or sabotage. The high severity and ease of exploitation increase the risk of targeted attacks or opportunistic exploitation by cybercriminals or state-sponsored actors. Additionally, compromised devices could be leveraged as entry points for ransomware or espionage campaigns. The lack of available patches means organizations must rely on network-level mitigations and monitoring to reduce risk. Failure to address this vulnerability promptly could lead to regulatory non-compliance under GDPR and other European cybersecurity directives if data breaches occur.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Immediately isolate ZLAN5143D devices from untrusted networks, restricting management interfaces to trusted internal segments only. 2) Employ network segmentation and firewall rules to limit access to the vulnerable API endpoint, allowing only authorized management hosts. 3) Monitor network traffic for unusual API calls or password change attempts targeting ZLAN5143D devices. 4) Conduct regular audits of device configurations and access logs to detect unauthorized changes. 5) Engage with the vendor to obtain timelines for patches or firmware updates and request interim security guidance. 6) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tailored to detect exploitation attempts. 7) If feasible, replace vulnerable devices with alternative products that have robust authentication controls. 8) Educate IT and security teams about the vulnerability and ensure incident response plans include scenarios involving device compromise. These measures go beyond generic advice by focusing on network-level controls and proactive monitoring tailored to the specific vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-01-29T21:07:29.858Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cb25d4b57a58fa1a74849

Added to database: 2/11/2026, 4:46:21 PM

Last enriched: 2/11/2026, 5:00:58 PM

Last updated: 2/11/2026, 5:50:54 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats