We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24522

KUNBUS Revolution Pi Authentication Bypass by Primary Weakness



Description

KUNBUS Revolution Pi OS Bookworm 01/2025 is vulnerable because authentication is not configured by default for the Node-RED server. This can give an unauthenticated remote attacker full access to the Node-RED server where they can run arbitrary commands on the underlying operating system.

Reserved 2025-04-17 | Published 2025-05-01 | Updated 2025-05-01 | Assigner icscert


CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-305

Product status

Default status
unaffected

Any version
affected

Credits

Adam Bromiley of Pen Test Partners reported these vulnerabilities to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-121-01

packages.revolutionpi.de/pool/main/p/pictory/

cve.org (CVE-2025-24522)

nvd.nist.gov (CVE-2025-24522)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-24522

Support options

Helpdesk Chat, Email, Knowledgebase