Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:teradek:slice_firmware:7.3.15:*:*:*:*:*:*:* |
Mon, 26 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 21 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teradek slice Firmware
|
|
| CPEs | cpe:2.3:h:teradek:slice:2.1:*:*:*:*:*:*:* cpe:2.3:o:teradek:slice_firmware:7.3.15:build31735:*:*:*:*:*:* |
|
| Vendors & Products |
Teradek slice Firmware
|
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teradek
Teradek slice |
|
| Vendors & Products |
Teradek
Teradek slice |
Wed, 24 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Teradek Slice 7.3.15 contains a cross-site request forgery vulnerability that allows attackers to change administrative passwords without proper request validation. Attackers can craft a malicious web page that automatically submits password change requests to the device when a logged-in user visits the page. | |
| Title | Teradek Slice 7.3.15 Cross-Site Request Forgery via Password Change | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T12:02:15.145Z
Reserved: 2025-12-24T14:28:02.436Z
Link: CVE-2018-25155
Updated: 2025-12-24T20:06:43.038Z
Status : Modified
Published: 2025-12-24T20:15:50.430
Modified: 2026-01-26T16:15:53.777
Link: CVE-2018-25155
No data.
OpenCVE Enrichment
Updated: 2025-12-29T22:33:40Z