This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT credentials and endpoints from the targeted device.
Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the MQTT broker and manipulate the communications of the targeted device.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT credentials and endpoints from the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the MQTT broker and manipulate the communications of the targeted device. | |
Title | Hard-coded Credentials Vulnerability in ZKTeco WL20 | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-In
Published: 2025-08-13T11:17:41.081Z
Updated: 2025-08-13T13:09:41.836Z
Reserved: 2025-07-22T08:56:34.299Z
Link: CVE-2025-54465

Updated: 2025-08-13T13:09:39.326Z

Status : Awaiting Analysis
Published: 2025-08-13T12:15:26.767
Modified: 2025-08-13T17:33:46.673
Link: CVE-2025-54465

No data.