Home

Description

Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo. Remote unauthenticated attacker is able to use this endpoint to e.g: retrieve cleartext password to the access point. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version V108_108 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

PUBLISHED Reserved 2025-10-28 | Published 2026-01-27 | Updated 2026-01-27 | Assigner CERT-PL




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

V108_108 (custom)
affected

Default status
unknown

V108_108 (custom)
affected

Credits

Wojciech Cybowski finder

References

cert.pl/en/posts/2026/01/CVE-2025-12386 third-party-advisory

www.pix-link.com/lv-wr21q product

github.com/wcyb/security_research exploit

cve.org (CVE-2025-12386)

nvd.nist.gov (CVE-2025-12386)

Download JSON