Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26049: CWE-522 in Jinan USR IOT Technology Limited (PUSR) USR-W610

0
Medium
VulnerabilityCVE-2026-26049cvecve-2026-26049cwe-522
Published: Fri Feb 20 2026 (02/20/2026, 16:03:56 UTC)
Source: CVE Database V5
Vendor/Project: Jinan USR IOT Technology Limited (PUSR)
Product: USR-W610

Description

The web management interface of the device renders the passwords in a plaintext input field. The current password is directly visible to anyone with access to the UI, potentially exposing administrator credentials to unauthorized observation via shoulder surfing, screenshots, or browser form caching.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:20:25 UTC

Technical Analysis

CVE-2026-26049 identifies a security weakness in the USR-W610 device's web management interface developed by Jinan USR IOT Technology Limited (PUSR). The vulnerability is classified under CWE-522, which pertains to the exposure of credentials in plaintext. Specifically, the device's web UI displays the administrator password in a plaintext input field rather than masking it. This design flaw allows anyone with access to the device's management interface to view the password directly without needing to extract it from encrypted storage or intercept network traffic. The risk is elevated in scenarios where multiple users share physical or remote UI access, or where screenshots or browser form caching mechanisms can capture the password. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N) indicates that the vulnerability can be exploited remotely over the network with low attack complexity, requires privileges (limited user access), and user interaction (accessing the UI). The impact is high on confidentiality since the password is exposed, but there is no direct impact on integrity or availability. No patches or known exploits have been reported as of the publication date, but the vulnerability poses a significant risk for credential leakage and subsequent unauthorized access if exploited.

Potential Impact

The primary impact of this vulnerability is the potential compromise of administrator credentials due to their exposure in plaintext within the device's management interface. If an attacker gains access to the UI, they can easily obtain the password through direct observation or by capturing screenshots or browser-stored form data. This can lead to unauthorized administrative access, allowing attackers to manipulate device configurations, disrupt operations, or pivot to other network assets. Organizations deploying USR-W610 devices in critical infrastructure, industrial environments, or enterprise networks face increased risk of insider threats or lateral movement attacks. While the vulnerability does not directly enable remote code execution or denial of service, the confidentiality breach can facilitate further attacks. The lack of known exploits reduces immediate risk, but the ease of password exposure means that any compromise of UI access can have serious consequences. The medium severity rating reflects this balance of impact and exploitability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict access controls to the USR-W610 management interface, limiting UI access to trusted personnel only. Network segmentation and firewall rules should restrict remote access to the device's web interface, ideally allowing management only from secure internal networks or via VPN. Administrators should avoid using shared or publicly accessible terminals to access the device UI to prevent shoulder surfing or accidental password exposure. Browser settings should be configured to disable form caching or autofill for sensitive fields. Monitoring and logging of management interface access can help detect unauthorized attempts. If possible, users should change default or known passwords regularly and consider using multi-factor authentication if supported by the device. Since no patches are currently available, these compensating controls are critical until the vendor releases a fix. Additionally, organizations should engage with the vendor for updates and consider alternative devices if the risk is unacceptable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-10T15:52:10.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c0ac2c4d84f260ce40b9

Added to database: 2/20/2026, 8:14:36 PM

Last enriched: 2/28/2026, 2:20:25 PM

Last updated: 4/6/2026, 6:28:20 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses