Home

Description

This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the plaintext sensitive data stored in the targeted device. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized network access, retrieve and manipulate data on the targeted device.

PUBLISHED Reserved 2025-08-12 | Published 2025-08-13 | Updated 2025-08-13 | Assigner CERT-In




MEDIUM: 5.2CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-312: Cleartext Storage of Sensitive Information

Product status

Default status
unaffected

<=ZLM31-FXO1-3.1.8
affected

Credits

This vulnerability is reported by Shravan Singh from Kavach IoT Security. finder

References

www.cert-in.org.in/...eid=PUBVLNOTES01&VLCODE=CIVN-2025-0172 third-party-advisory

cve.org (CVE-2025-55280)

nvd.nist.gov (CVE-2025-55280)

Download JSON