ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45813 | Exploit Third Party Advisory |
| https://www.enensys.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Oct 2025, 19:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-45813 - Exploit, Third Party Advisory | |
| References | () https://www.enensys.com/ - Product | |
| CPE | cpe:2.3:h:enensys:ipguardv2:-:*:*:*:*:*:*:* cpe:2.3:o:enensys:ipguardv2_firmware:2.10.0:*:*:*:*:*:*:* |
|
| First Time |
Enensys
Enensys ipguardv2 Firmware Enensys ipguardv2 |
03 Jul 2025, 15:13
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-02 18:15
Updated : 2025-10-10 19:41
NVD link : CVE-2025-45813
Mitre link : CVE-2025-45813
CVE.ORG link : CVE-2025-45813
JSON object : View
Products Affected
enensys
- ipguardv2
- ipguardv2_firmware
CWE
CWE-798
Use of Hard-coded Credentials
