CVE-2025-45813

ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:enensys:ipguardv2_firmware:2.10.0:*:*:*:*:*:*:*
cpe:2.3:h:enensys:ipguardv2:-:*:*:*:*:*:*:*

History

10 Oct 2025, 19:41

Type Values Removed Values Added
References () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45813 - () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45813 - Exploit, Third Party Advisory
References () https://www.enensys.com/ - () https://www.enensys.com/ - Product
CPE cpe:2.3:h:enensys:ipguardv2:-:*:*:*:*:*:*:*
cpe:2.3:o:enensys:ipguardv2_firmware:2.10.0:*:*:*:*:*:*:*
First Time Enensys
Enensys ipguardv2 Firmware
Enensys ipguardv2

03 Jul 2025, 15:13

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-02 18:15

Updated : 2025-10-10 19:41


NVD link : CVE-2025-45813

Mitre link : CVE-2025-45813

CVE.ORG link : CVE-2025-45813


JSON object : View

Products Affected

enensys

  • ipguardv2_firmware
  • ipguardv2
CWE
CWE-798

Use of Hard-coded Credentials