Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| http://revotech.com |
|
| https://github.com/Remenis/CVE-2025-67158 |
|
Fri, 30 Jan 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Revotech i6032w-fhw Firmware
|
|
| CPEs | cpe:2.3:h:revotech:i6032w-fhw:-:*:*:*:*:*:*:* cpe:2.3:o:revotech:i6032w-fhw_firmware:1.0.0014:*:*:*:*:*:*:* |
|
| Vendors & Products |
Revotech i6032w-fhw Firmware
|
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 05 Jan 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Revotech
Revotech i6032w-fhw |
|
| Vendors & Products |
Revotech
Revotech i6032w-fhw |
Fri, 02 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 20210517 allows attackers to access sensitive information and escalate privileges via a crafted HTTP request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-05T20:49:25.386Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67158
Updated: 2026-01-05T20:47:29.464Z
Status : Analyzed
Published: 2026-01-02T17:16:23.310
Modified: 2026-01-30T01:44:59.747
Link: CVE-2025-67158
No data.
OpenCVE Enrichment
Updated: 2026-01-05T12:25:10Z