Home

Description

This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT credentials and endpoints from the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the MQTT broker and manipulate the communications of the targeted device.

PUBLISHED Reserved 2025-07-22 | Published 2025-08-13 | Updated 2025-08-13 | Assigner CERT-In




MEDIUM: 6.8CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-798: Use of Hard-coded Credentials

Product status

Default status
unaffected

<=ZLM31-FXO1-3.1.8
affected

Credits

This vulnerability is reported by Shravan Singh from Kavach IoT Security. finder

References

www.cert-in.org.in/...eid=PUBVLNOTES01&VLCODE=CIVN-2025-0172 third-party-advisory

www.zkteco.com/en/Security_Bulletinsibs/20 vendor-advisory

cve.org (CVE-2025-54465)

nvd.nist.gov (CVE-2025-54465)

Download JSON