We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5484

SinoTrack GPS Receiver Weak Authentication



Description

A username and password are required to authenticate to the central SinoTrack device management interface. The username for all devices is an identifier printed on the receiver. The default password is well-known and common to all devices. Modification of the default password is not enforced during device setup. A malicious actor can retrieve device identifiers with either physical access or by capturing identifiers from pictures of the devices posted on publicly accessible websites such as eBay.

Reserved 2025-06-02 | Published 2025-06-12 | Updated 2025-06-12 | Assigner icscert


HIGH: 8.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L

HIGH: 7.6CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-1390

Product status

Default status
unaffected

All versions
affected

Credits

Raúl Ignacio Cruz Jiménez reported these vulnerabilities to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-160-01

www.sinotrackgps.com/help-center

cve.org (CVE-2025-5484)

nvd.nist.gov (CVE-2025-5484)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5484

Support options

Helpdesk Chat, Email, Knowledgebase