Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.ecessa.com |
|
| https://www.exploit-db.com/exploits/44938 |
|
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:ecessa:shieldlink_sl175ehq_firmware:10.7.4:*:*:*:*:*:*:* |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ecessa
Ecessa shieldlink Sl175ehq Ecessa shieldlink Sl175ehq Firmware |
|
| Vendors & Products |
Ecessa
Ecessa shieldlink Sl175ehq Ecessa shieldlink Sl175ehq Firmware |
Thu, 25 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ecessa ShieldLink SL175EHQ 10.7.4 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without authentication. Attackers can craft a malicious web page with a hidden form to add a superuser account by tricking a logged-in administrator into loading the page. | |
| Title | Ecessa ShieldLink SL175EHQ 10.7.4 Cross-Site Request Forgery via User Configuration | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T12:02:14.314Z
Reserved: 2025-12-24T14:28:02.436Z
Link: CVE-2018-25150
Updated: 2025-12-24T20:10:51.261Z
Status : Deferred
Published: 2025-12-24T20:15:49.663
Modified: 2026-04-15T00:35:42.020
Link: CVE-2018-25150
No data.
OpenCVE Enrichment
Updated: 2025-12-29T23:04:28Z