CVE-2019-25436

Sricam DeviceViewer 3.12.0.1 contains a password change security bypass vulnerability that allows authenticated users to change passwords without proper validation of the old password field. Attackers can inject a large payload into the old password parameter during the change password process to bypass validation and set an arbitrary new password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:*

History

26 Feb 2026, 02:33

Type Values Removed Values Added
First Time Sricam deviceviewer
Sricam
References () http://www.sricam.com/ - () http://www.sricam.com/ - Product
References () https://www.exploit-db.com/exploits/47476 - () https://www.exploit-db.com/exploits/47476 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/sricam-deviceviewer-password-change-security-bypass - () https://www.vulncheck.com/advisories/sricam-deviceviewer-password-change-security-bypass - Third Party Advisory
Summary
  • (es) Sricam DeviceViewer 3.12.0.1 contiene una vulnerabilidad de omisión de seguridad en el cambio de contraseña que permite a usuarios autenticados cambiar contraseñas sin la validación adecuada del campo de contraseña antigua. Los atacantes pueden inyectar una carga útil grande en el parámetro de contraseña antigua durante el proceso de cambio de contraseña para omitir la validación y establecer una nueva contraseña arbitraria.
CPE cpe:2.3:a:sricam:deviceviewer:3.12.0.1:*:*:*:*:-:*:*

20 Feb 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-20 23:16

Updated : 2026-02-26 02:33


NVD link : CVE-2019-25436

Mitre link : CVE-2019-25436

CVE.ORG link : CVE-2019-25436


JSON object : View

Products Affected

sricam

  • deviceviewer
CWE
CWE-303

Incorrect Implementation of Authentication Algorithm