The 2wcom IP-4c 2.15.5 device's web interface includes an information disclosure vulnerability. By sending a crafted POST request to a specific endpoint (/cwi/ajax_request/get_data.php), an authenticated attacker (even with a low-privileged account like guest) can retrieve the hashed passwords for the admin, manager, and guest accounts. This significantly weakens the system's security posture, as these hashes could be cracked offline, granting attackers administrative access to the device.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 | Exploit Third Party Advisory |
| https://www.2wcom.com/ | Product |
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
14 Oct 2025, 19:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 - Exploit, Third Party Advisory | |
| References | () https://www.2wcom.com/ - Product | |
| First Time |
2wcom ip-4c Firmware
2wcom ip-4c 2wcom |
|
| CPE | cpe:2.3:h:2wcom:ip-4c:-:*:*:*:*:*:*:* cpe:2.3:o:2wcom:ip-4c_firmware:2.15.5:*:*:*:*:*:*:* |
23 Sep 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57433 - | |
| CWE | CWE-200 |
22 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-22 16:15
Updated : 2025-10-14 19:56
NVD link : CVE-2025-57433
Mitre link : CVE-2025-57433
CVE.ORG link : CVE-2025-57433
JSON object : View
Products Affected
2wcom
- ip-4c_firmware
- ip-4c
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
