Home

Description

Tinycontrol LAN Controller 1.58a contains an authentication bypass vulnerability that allows unauthenticated attackers to change admin passwords through a crafted API request. Attackers can exploit the /stm.cgi endpoint with a specially crafted authentication parameter to disable access controls and modify administrative credentials.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Missing Authorization

Product status

HW 3.8
affected

Unknown (semver)
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/51732 (ExploitDB-51732) exploit

www.tinycontrol.pl (Tinycontrol Official Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5787.php (Zero Science Lab Disclosure (ZSL-2023-5787)) third-party-advisory

www.vulncheck.com/...cation-bypass-via-admin-password-change (VulnCheck Advisory: Tinycontrol LAN Controller 1.58a Authentication Bypass via Admin Password Change) third-party-advisory

cve.org (CVE-2023-54327)

nvd.nist.gov (CVE-2023-54327)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.