The affected models are out of support; replacing the device is recommended.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19052 | Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials. The affected models are out of support; replacing the device is recommended. |
Tue, 24 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Jun 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials. The affected models are out of support; replacing the device is recommended. | |
| Title | Sapido Wireless Router - Exposure of Sensitive Information | |
| Weaknesses | CWE-256 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-06-24T16:48:18.117Z
Reserved: 2025-06-24T01:24:45.808Z
Link: CVE-2025-6560
Updated: 2025-06-24T16:48:14.671Z
Status : Deferred
Published: 2025-06-24T03:15:35.897
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6560
No data.
OpenCVE Enrichment
No data.
EUVD