Sricam DeviceViewer 3.12.0.1 contains a password change security bypass vulnerability that allows authenticated users to change passwords without proper validation of the old password field. Attackers can inject a large payload into the old password parameter during the change password process to bypass validation and set an arbitrary new password.
References
| Link | Resource |
|---|---|
| http://www.sricam.com/ | Product |
| https://www.exploit-db.com/exploits/47476 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/sricam-deviceviewer-password-change-security-bypass | Third Party Advisory |
Configurations
History
26 Feb 2026, 02:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sricam deviceviewer
Sricam |
|
| References | () http://www.sricam.com/ - Product | |
| References | () https://www.exploit-db.com/exploits/47476 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/sricam-deviceviewer-password-change-security-bypass - Third Party Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:* |
20 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 23:16
Updated : 2026-02-26 02:33
NVD link : CVE-2019-25436
Mitre link : CVE-2019-25436
CVE.ORG link : CVE-2019-25436
JSON object : View
Products Affected
sricam
- deviceviewer
CWE
CWE-303
Incorrect Implementation of Authentication Algorithm
