Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26049: CWE-522 in Jinan USR IOT Technology Limited (PUSR) USR-W610

0
Medium
VulnerabilityCVE-2026-26049cvecve-2026-26049cwe-522
Published: Fri Feb 20 2026 (02/20/2026, 16:03:56 UTC)
Source: CVE Database V5
Vendor/Project: Jinan USR IOT Technology Limited (PUSR)
Product: USR-W610

Description

The web management interface of the device renders the passwords in a plaintext input field. The current password is directly visible to anyone with access to the UI, potentially exposing administrator credentials to unauthorized observation via shoulder surfing, screenshots, or browser form caching.

AI-Powered Analysis

AILast updated: 02/20/2026, 20:29:30 UTC

Technical Analysis

CVE-2026-26049 identifies a security vulnerability in the USR-W610 device produced by Jinan USR IOT Technology Limited (PUSR). The vulnerability is classified under CWE-522, which pertains to the exposure of passwords in plaintext. Specifically, the device's web management interface renders administrator passwords directly in plaintext input fields rather than masking them. This design flaw allows anyone with access to the user interface—whether through physical proximity or remote access—to view the current password without additional authentication or decryption steps. The exposure vector includes shoulder surfing, capturing screenshots, or browser form caching mechanisms that store visible password fields. The vulnerability requires an attacker to have at least limited privileges (PR:L) and user interaction (UI:R), indicating that exploitation is not fully remote or automatic but still feasible in environments where UI access is granted or can be coerced. The CVSS v3.1 base score is 5.7, reflecting a medium severity due to high confidentiality impact but no impact on integrity or availability. No patches or fixes have been released at the time of publication, and no known exploits have been reported in the wild. This vulnerability primarily threatens the confidentiality of administrator credentials, potentially enabling unauthorized access if combined with other attack vectors. The affected product is an IoT device often deployed in industrial or networked environments, where secure management interfaces are critical.

Potential Impact

The primary impact of CVE-2026-26049 is the compromise of administrator credential confidentiality. Exposure of plaintext passwords can lead to unauthorized access to the device's management interface, enabling attackers to alter configurations, disrupt operations, or pivot to other network segments. Although the vulnerability does not directly affect integrity or availability, the resulting unauthorized access could facilitate further attacks that do. Organizations relying on USR-W610 devices in critical infrastructure, industrial control systems, or IoT deployments face increased risk of credential theft and subsequent compromise. The ease of exploitation is moderate, requiring some level of access and user interaction, but the widespread use of such devices in networked environments raises the potential attack surface. Additionally, the lack of patches means the vulnerability may persist for some time, increasing exposure. The confidentiality breach could also lead to compliance violations or reputational damage if administrative credentials are leaked or misused.

Mitigation Recommendations

To mitigate CVE-2026-26049, organizations should implement strict access controls limiting who can access the USR-W610 web management interface, ideally restricting it to trusted networks or VPNs. Disable or limit browser form caching for management interfaces to prevent password storage in plaintext. Encourage or enforce the use of password managers that do not autofill plaintext fields or mask passwords properly. Where possible, replace or upgrade devices to versions that do not expose passwords in plaintext or apply vendor patches once available. Employ multi-factor authentication (MFA) on management interfaces to reduce the impact of credential exposure. Monitor access logs for unusual login attempts or access patterns. Conduct regular security awareness training to reduce risks from shoulder surfing or social engineering. Network segmentation can also limit the exposure of vulnerable devices to untrusted users. Finally, consider using encrypted management protocols and secure UI design principles to prevent similar issues in future deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-10T15:52:10.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c0ac2c4d84f260ce40b9

Added to database: 2/20/2026, 8:14:36 PM

Last enriched: 2/20/2026, 8:29:30 PM

Last updated: 2/20/2026, 11:09:54 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats