Anevia Flamingo XL/XS 3.6.20 contains a critical vulnerability with weak default administrative credentials that can be easily guessed. Attackers can leverage these hard-coded credentials to gain full remote system control without complex authentication mechanisms.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2023060019 | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/259059 | Third Party Advisory |
| https://packetstormsecurity.com/files/172875/Anevia-Flamingo-XL-XS-3.6.x-Default-Hardcoded-Credentials.html | Third Party Advisory |
| https://www.ateme.com/ | Product |
| https://www.vulncheck.com/advisories/anevia-flamingo-xlxs-default-credentials-authentication-bypass | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php | Third Party Advisory Exploit |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php | Third Party Advisory Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
|
History
13 Jan 2026, 21:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cxsecurity.com/issue/WLB-2023060019 - Third Party Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/259059 - Third Party Advisory | |
| References | () https://packetstormsecurity.com/files/172875/Anevia-Flamingo-XL-XS-3.6.x-Default-Hardcoded-Credentials.html - Third Party Advisory | |
| References | () https://www.ateme.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/anevia-flamingo-xlxs-default-credentials-authentication-bypass - Third Party Advisory | |
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php - Third Party Advisory, Exploit | |
| CPE | cpe:2.3:h:ateme:flamingo_xs:1.1:*:*:*:*:*:*:* cpe:2.3:a:ateme:soaplive:2.4.1:*:*:*:*:*:*:* cpe:2.3:o:ateme:flamingo_xs_firmware:3.2.9:*:*:*:*:*:*:* cpe:2.3:h:ateme:flamingo_xl:1.1:*:*:*:*:*:*:* cpe:2.3:a:ateme:soapsystem:1.3.1:*:*:*:*:*:*:* cpe:2.3:o:ateme:flamingo_xl_firmware:3.2.9:*:*:*:*:*:*:* cpe:2.3:o:ateme:flamingo_xl_firmware:3.6.20:*:*:*:*:*:*:* cpe:2.3:h:ateme:flamingo_xl:1.0:*:*:*:*:*:*:* cpe:2.3:a:ateme:soaplive:2.0.3:*:*:*:*:*:*:* cpe:2.3:h:ateme:flamingo_xs:1.0:*:*:*:*:*:*:* cpe:2.3:o:ateme:flamingo_xs_firmware:3.6.20:*:*:*:*:*:*:* |
|
| First Time |
Ateme
Ateme flamingo Xs Firmware Ateme flamingo Xs Ateme soapsystem Ateme flamingo Xl Firmware Ateme flamingo Xl Ateme soaplive |
02 Jan 2026, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php - |
30 Dec 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-30 23:15
Updated : 2026-01-13 21:48
NVD link : CVE-2023-53983
Mitre link : CVE-2023-53983
CVE.ORG link : CVE-2023-53983
JSON object : View
Products Affected
ateme
- flamingo_xl
- soaplive
- flamingo_xs
- soapsystem
- flamingo_xs_firmware
- flamingo_xl_firmware
CWE
CWE-798
Use of Hard-coded Credentials
