CVE-2026-26049: CWE-522 in Jinan USR IOT Technology Limited (PUSR) USR-W610
The web management interface of the device renders the passwords in a plaintext input field. The current password is directly visible to anyone with access to the UI, potentially exposing administrator credentials to unauthorized observation via shoulder surfing, screenshots, or browser form caching.
AI Analysis
Technical Summary
CVE-2026-26049 identifies a security weakness in the USR-W610 device's web management interface developed by Jinan USR IOT Technology Limited (PUSR). The vulnerability is classified under CWE-522, which pertains to the exposure of credentials in plaintext. Specifically, the device's web UI displays the administrator password in a plaintext input field rather than masking it. This design flaw allows anyone with access to the device's management interface to view the password directly without needing to extract it from encrypted storage or intercept network traffic. The risk is elevated in scenarios where multiple users share physical or remote UI access, or where screenshots or browser form caching mechanisms can capture the password. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N) indicates that the vulnerability can be exploited remotely over the network with low attack complexity, requires privileges (limited user access), and user interaction (accessing the UI). The impact is high on confidentiality since the password is exposed, but there is no direct impact on integrity or availability. No patches or known exploits have been reported as of the publication date, but the vulnerability poses a significant risk for credential leakage and subsequent unauthorized access if exploited.
Potential Impact
The primary impact of this vulnerability is the potential compromise of administrator credentials due to their exposure in plaintext within the device's management interface. If an attacker gains access to the UI, they can easily obtain the password through direct observation or by capturing screenshots or browser-stored form data. This can lead to unauthorized administrative access, allowing attackers to manipulate device configurations, disrupt operations, or pivot to other network assets. Organizations deploying USR-W610 devices in critical infrastructure, industrial environments, or enterprise networks face increased risk of insider threats or lateral movement attacks. While the vulnerability does not directly enable remote code execution or denial of service, the confidentiality breach can facilitate further attacks. The lack of known exploits reduces immediate risk, but the ease of password exposure means that any compromise of UI access can have serious consequences. The medium severity rating reflects this balance of impact and exploitability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict access controls to the USR-W610 management interface, limiting UI access to trusted personnel only. Network segmentation and firewall rules should restrict remote access to the device's web interface, ideally allowing management only from secure internal networks or via VPN. Administrators should avoid using shared or publicly accessible terminals to access the device UI to prevent shoulder surfing or accidental password exposure. Browser settings should be configured to disable form caching or autofill for sensitive fields. Monitoring and logging of management interface access can help detect unauthorized attempts. If possible, users should change default or known passwords regularly and consider using multi-factor authentication if supported by the device. Since no patches are currently available, these compensating controls are critical until the vendor releases a fix. Additionally, organizations should engage with the vendor for updates and consider alternative devices if the risk is unacceptable.
Affected Countries
China, United States, Germany, South Korea, Japan, India, United Kingdom, France, Brazil, Russia
CVE-2026-26049: CWE-522 in Jinan USR IOT Technology Limited (PUSR) USR-W610
Description
The web management interface of the device renders the passwords in a plaintext input field. The current password is directly visible to anyone with access to the UI, potentially exposing administrator credentials to unauthorized observation via shoulder surfing, screenshots, or browser form caching.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26049 identifies a security weakness in the USR-W610 device's web management interface developed by Jinan USR IOT Technology Limited (PUSR). The vulnerability is classified under CWE-522, which pertains to the exposure of credentials in plaintext. Specifically, the device's web UI displays the administrator password in a plaintext input field rather than masking it. This design flaw allows anyone with access to the device's management interface to view the password directly without needing to extract it from encrypted storage or intercept network traffic. The risk is elevated in scenarios where multiple users share physical or remote UI access, or where screenshots or browser form caching mechanisms can capture the password. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N) indicates that the vulnerability can be exploited remotely over the network with low attack complexity, requires privileges (limited user access), and user interaction (accessing the UI). The impact is high on confidentiality since the password is exposed, but there is no direct impact on integrity or availability. No patches or known exploits have been reported as of the publication date, but the vulnerability poses a significant risk for credential leakage and subsequent unauthorized access if exploited.
Potential Impact
The primary impact of this vulnerability is the potential compromise of administrator credentials due to their exposure in plaintext within the device's management interface. If an attacker gains access to the UI, they can easily obtain the password through direct observation or by capturing screenshots or browser-stored form data. This can lead to unauthorized administrative access, allowing attackers to manipulate device configurations, disrupt operations, or pivot to other network assets. Organizations deploying USR-W610 devices in critical infrastructure, industrial environments, or enterprise networks face increased risk of insider threats or lateral movement attacks. While the vulnerability does not directly enable remote code execution or denial of service, the confidentiality breach can facilitate further attacks. The lack of known exploits reduces immediate risk, but the ease of password exposure means that any compromise of UI access can have serious consequences. The medium severity rating reflects this balance of impact and exploitability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict access controls to the USR-W610 management interface, limiting UI access to trusted personnel only. Network segmentation and firewall rules should restrict remote access to the device's web interface, ideally allowing management only from secure internal networks or via VPN. Administrators should avoid using shared or publicly accessible terminals to access the device UI to prevent shoulder surfing or accidental password exposure. Browser settings should be configured to disable form caching or autofill for sensitive fields. Monitoring and logging of management interface access can help detect unauthorized attempts. If possible, users should change default or known passwords regularly and consider using multi-factor authentication if supported by the device. Since no patches are currently available, these compensating controls are critical until the vendor releases a fix. Additionally, organizations should engage with the vendor for updates and consider alternative devices if the risk is unacceptable.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-02-10T15:52:10.261Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6998c0ac2c4d84f260ce40b9
Added to database: 2/20/2026, 8:14:36 PM
Last enriched: 2/28/2026, 2:20:25 PM
Last updated: 4/6/2026, 6:28:20 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.