Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 10 Jun 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kunbus
Kunbus revpi Status |
|
| CPEs | cpe:2.3:a:kunbus:revpi_status:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kunbus
Kunbus revpi Status |
Fri, 06 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device | |
| Title | RevPi Webstatus application is vulnerable to an authentication bypass | |
| Weaknesses | CWE-704 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-06-06T15:06:11.989Z
Reserved: 2025-04-16T11:17:48.305Z
Link: CVE-2025-41646
Updated: 2025-06-06T15:06:00.706Z
Status : Analyzed
Published: 2025-06-06T15:15:26.183
Modified: 2025-06-10T19:29:22.893
Link: CVE-2025-41646
No data.
OpenCVE Enrichment
No data.