A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.
                
            References
                    Configurations
                    No configuration.
History
                    08 Jul 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
| CWE | CWE-798 | 
08 Jul 2025, 16:18
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
07 Jul 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-07-07 16:15
Updated : 2025-07-08 18:15
NVD link : CVE-2025-52492
Mitre link : CVE-2025-52492
CVE.ORG link : CVE-2025-52492
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
