The 2wcom IP-4c 2.15.5 device suffers from a Broken Access Control vulnerability. Certain sensitive endpoints are intended to be accessible only after the admin explicitly grants access to a manager-level account. However, a manager-level user can bypass these controls by intercepting and modifying requests.
References
Link | Resource |
---|---|
https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57438 | Exploit Third Party Advisory |
https://www.2wcom.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Oct 2025, 21:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:2wcom:ip-4c:-:*:*:*:*:*:*:* cpe:2.3:o:2wcom:ip-4c_firmware:2.15.5:*:*:*:*:*:*:* |
|
First Time |
2wcom ip-4c Firmware
2wcom ip-4c 2wcom |
|
References | () https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-57438 - Exploit, Third Party Advisory | |
References | () https://www.2wcom.com/ - Product |
22 Sep 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-22 18:15
Updated : 2025-10-10 21:05
NVD link : CVE-2025-57438
Mitre link : CVE-2025-57438
CVE.ORG link : CVE-2025-57438
JSON object : View
Products Affected
2wcom
- ip-4c_firmware
- ip-4c