Home

Description

FaceSentry Access Control System 6.4.8 contains a critical authentication vulnerability with hard-coded SSH credentials for the wwwuser account. Attackers can leverage the insecure sudoers configuration to escalate privileges and gain root access by executing sudo commands without authentication.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-31 | Assigner VulnCheck




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Use of Hard-coded Credentials

Product status

Default status
unaffected

6.4.8 build 264
affected

5.7.2 build 568
affected

5.7.0 build 539
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5526.php exploit

www.exploit-db.com/exploits/47067 (ExploitDB-47067) exploit

www.iwt.com.hk (Vendor Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5526.php (Zero Science Lab Disclosure (ZSL-2019-5526)) third-party-advisory

cve.org (CVE-2019-25241)

nvd.nist.gov (CVE-2019-25241)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.