A vulnerability, which was classified as problematic, was found in iteaj iboot 物联网网关 1.1.3. This affects an unknown part of the file /core/admin/pwd of the component Admin Password Handler. The manipulation of the argument ID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes | Exploit |
https://vuldb.com/?ctiid.303537 | Permissions Required VDB Entry |
https://vuldb.com/?id.303537 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.551869 | Third Party Advisory VDB Entry |
https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes | Exploit |
Configurations
History
08 Apr 2025, 18:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:* | |
First Time |
Iteaj iboot
Iteaj |
|
CWE | CWE-434 | |
References | () https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes - Exploit | |
References | () https://vuldb.com/?ctiid.303537 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.303537 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.551869 - Third Party Advisory, VDB Entry |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes - |
06 Apr 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-06 23:15
Updated : 2025-04-08 18:53
NVD link : CVE-2025-3325
Mitre link : CVE-2025-3325
CVE.ORG link : CVE-2025-3325
JSON object : View
Products Affected
iteaj
- iboot