Home

Description

Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcoded default credentials that allow unauthenticated remote access to web, telnet, and SSH interfaces. Attackers can exploit these credentials to gain root-level access and execute system commands across multiple Adtec Digital product versions.

PUBLISHED Reserved 2026-01-03 | Published 2026-01-06 | Updated 2026-01-06 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Use of Hard-coded Credentials

Use of Default Credentials

Product status

2.08.28
affected

3.07.19
affected

1905_11
affected

2.01.15
affected

3.00.29
affected

3.00.29
affected

2.02.24
affected

1.02.05
affected

2.07.09
affected

2.07.09
affected

2.5.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/48954 exploit

www.exploit-db.com/exploits/48954 (ExploitDB-48954) exploit

www.adtecdigital.com (Adtec Digital Official Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5603.php (Zero Science Lab Disclosure (ZSL-2020-5603)) third-party-advisory

packetstorm.news/files/id/159709 (Packet Storm Security Exploit Entry) exploit

exchange.xforce.ibmcloud.com/vulnerabilities/190628 (IBM X-Force Vulnerability Exchange) vdb-entry

www.vulncheck.com/...ital-signage-player-default-credentials (VulnCheck Advisory: Adtec Digital SignEdje Digital Signage Player v2.08.28 Default Credentials) third-party-advisory

cve.org (CVE-2020-36915)

nvd.nist.gov (CVE-2020-36915)

Download JSON