Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager

0
Critical
VulnerabilityCVE-2026-25803cvecve-2026-25803cwe-798
Published: Fri Feb 06 2026 (02/06/2026, 22:52:40 UTC)
Source: CVE Database V5
Vendor/Project: denpiligrim
Product: 3dp-manager

Description

CVE-2026-25803 is a critical vulnerability in denpiligrim's 3dp-manager version 2. 0. 1 and earlier, where the application creates a default administrative account with hard-coded credentials (admin/admin) upon first initialization. This flaw allows any attacker with network access to the login interface to gain full administrative control without authentication, enabling management of VPN tunnels and system settings. The vulnerability has a CVSS score of 9. 8, indicating a critical severity due to its ease of exploitation and high impact on confidentiality, integrity, and availability. A patch is planned for version 2. 0. 2. European organizations using affected versions are at significant risk, especially those relying on 3dp-manager for VPN and network management.

AI-Powered Analysis

AILast updated: 02/06/2026, 23:15:26 UTC

Technical Analysis

CVE-2026-25803 is a critical security vulnerability identified in the denpiligrim 3dp-manager product, specifically affecting versions 2.0.1 and earlier. The vulnerability arises from the use of hard-coded default credentials (username: admin, password: admin) that the application automatically creates upon its initial setup. This default administrative account is accessible via the application's login interface, which is exposed over the network. Because the credentials are well-known and cannot be changed prior to patching, any attacker with network access to the interface can authenticate without restriction. Once authenticated, the attacker gains full administrative privileges, allowing them to manage VPN tunnels and alter system settings, potentially compromising the confidentiality, integrity, and availability of the affected systems and connected networks. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a common and dangerous security weakness. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical nature, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild yet, the simplicity of exploitation and the high impact make this a significant threat. The vendor plans to release a patch in version 2.0.2 to eliminate the hard-coded credentials and presumably enforce secure credential management practices.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those utilizing denpiligrim 3dp-manager for managing VPN tunnels and network configurations. Successful exploitation can lead to full administrative compromise, enabling attackers to intercept, redirect, or disrupt sensitive network traffic, potentially exposing confidential data or causing operational outages. The ability to control VPN tunnels could allow attackers to bypass perimeter defenses, escalate privileges, and move laterally within corporate networks. This can result in data breaches, service disruptions, and damage to organizational reputation. Critical infrastructure sectors and enterprises with stringent compliance requirements (e.g., GDPR) may face regulatory penalties if such a compromise leads to data loss or exposure. The vulnerability's network-exposed interface and lack of authentication barriers make it particularly dangerous in environments with insufficient network segmentation or weak perimeter controls.

Mitigation Recommendations

1. Upgrade to denpiligrim 3dp-manager version 2.0.2 or later immediately upon release to eliminate the hard-coded credentials. 2. Until the patch is applied, restrict network access to the 3dp-manager login interface using firewall rules, VPN segmentation, or access control lists to limit exposure to trusted administrators only. 3. Implement network segmentation to isolate the management interface from general user networks and the internet. 4. Monitor authentication logs and network traffic for unusual login attempts or access patterns targeting the 3dp-manager interface. 5. If possible, disable or change default accounts manually if the application allows, or deploy compensating controls such as multi-factor authentication at the network perimeter. 6. Conduct a thorough audit of VPN configurations and system settings after patching to detect any unauthorized changes made prior to remediation. 7. Educate IT staff about the risks of hard-coded credentials and enforce secure credential management policies for all network management tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T19:58:01.641Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69867278f9fa50a62f39d4ee

Added to database: 2/6/2026, 11:00:08 PM

Last enriched: 2/6/2026, 11:15:26 PM

Last updated: 2/7/2026, 12:03:29 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats