{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T10:52:16.109","vulnerabilities":[{"cve":{"id":"CVE-2025-2765","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-04-23T17:16:54.530","lastModified":"2025-07-11T14:01:48.557","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"CarlinKit CPC200-CCPA Wireless Hotspot Hard-Coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of CarlinKit CPC200-CCPA devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of the wireless hotspot. The issue results from the use of hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-24349."},{"lang":"es","value":"Vulnerabilidad de omisión de autenticación con credenciales codificadas en el punto de acceso inalámbrico CarlinKit CPC200-CCPA. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticación en las instalaciones afectadas de dispositivos CarlinKit CPC200-CCPA. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en la configuración del punto de acceso inalámbrico. El problema se debe al uso de credenciales codificadas. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Anteriormente, se denominó ZDI-CAN-24349."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.7}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:carlinkit:autokit:2024.01.19.1541:*:*:*:*:*:*:*","matchCriteriaId":"9073FE92-A75A-4996-A425-9B2529CE7A8E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:carlinkit:cpc200-ccpa:*:*:*:*:*:*:*:*","matchCriteriaId":"9B71C213-B739-4DBB-B045-49AC0FA85A06"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-177/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}