Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16473 | Default credentials were present in the web portal for Airpointer 2.4.107-2, allowing an unauthenticated malicious actor to log in via the web portal |
| Link | Providers |
|---|---|
| https://jct-aq.com/products/airpointer2d/ |
|
Fri, 30 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 May 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Default credentials were present in the web portal for Airpointer 2.4.107-2, allowing an unauthenticated malicious actor to log in via the web portal | |
| Title | Default Credentials | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2025-05-30T13:55:29.519Z
Reserved: 2025-05-13T01:42:10.990Z
Link: CVE-2025-4633
Updated: 2025-05-30T13:55:26.069Z
Status : Deferred
Published: 2025-05-30T09:15:25.233
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-4633
No data.
OpenCVE Enrichment
No data.
EUVD