Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31019 | Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication. |
Tue, 18 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 28 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aztech
Aztech dsl5005en |
|
| Vendors & Products |
Aztech
Aztech dsl5005en |
Wed, 24 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-17T18:31:46.604Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56241
Updated: 2025-10-28T20:17:43.502Z
Status : Deferred
Published: 2025-09-24T18:15:38.200
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-56241
No data.
OpenCVE Enrichment
Updated: 2025-09-25T08:22:01Z
EUVD