Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Senselive x3500
Senselive x3500 Firmware |
|
| CPEs | cpe:2.3:h:senselive:x3500:-:*:*:*:*:*:*:* cpe:2.3:o:senselive:x3500_firmware:1.523:*:*:*:*:*:*:* |
|
| Vendors & Products |
Senselive x3500
Senselive x3500 Firmware |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Senselive
Senselive x3050 |
|
| Vendors & Products |
Senselive
Senselive x3050 |
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of request origin or implement CSRF tokens, a malicious external webpage could cause a user's browser to submit unauthorized configuration requests to the device. | |
| Title | SenseLive X3050 Cross-Site request forgery | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-24T18:18:30.759Z
Reserved: 2026-04-14T15:57:14.980Z
Link: CVE-2026-27841
Updated: 2026-04-24T16:50:43.813Z
Status : Analyzed
Published: 2026-04-24T00:16:26.933
Modified: 2026-04-28T19:32:20.600
Link: CVE-2026-27841
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:25:29Z