An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device's insufficient cookie verification, allowing an attacker to directly request the configuration file address and download the core configuration file without logging into the device management backend. By reading the corresponding username and self-decrypted MD5 password in the core configuration file, the attacker can directly log in to the backend, thereby bypassing the front-end backend login page.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-565 | |
| Metrics |
cvssV3_1
|
Tue, 06 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device's insufficient cookie verification, allowing an attacker to directly request the configuration file address and download the core configuration file without logging into the device management backend. By reading the corresponding username and self-decrypted MD5 password in the core configuration file, the attacker can directly log in to the backend, thereby bypassing the front-end backend login page. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-06T16:39:03.626Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65212
Updated: 2026-01-06T16:37:58.960Z
Status : Received
Published: 2026-01-06T16:15:51.670
Modified: 2026-01-06T17:15:44.870
Link: CVE-2025-65212
No data.
OpenCVE Enrichment
No data.