Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Feb 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:* |
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sricam
Sricam deviceviewer |
|
| Vendors & Products |
Sricam
Sricam deviceviewer |
Fri, 20 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sricam DeviceViewer 3.12.0.1 contains a password change security bypass vulnerability that allows authenticated users to change passwords without proper validation of the old password field. Attackers can inject a large payload into the old password parameter during the change password process to bypass validation and set an arbitrary new password. | |
| Title | Sricam DeviceViewer 3.12.0.1 Password Change Security Bypass | |
| Weaknesses | CWE-303 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:01.184Z
Reserved: 2026-02-19T22:16:31.161Z
Link: CVE-2019-25436
Updated: 2026-02-24T15:28:42.795Z
Status : Analyzed
Published: 2026-02-20T23:16:00.453
Modified: 2026-02-26T02:33:11.467
Link: CVE-2019-25436
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:33:22Z