CVE-2025-54816

This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the security of the entire system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:evmapa:evmapa:*:*:*:*:*:*:*:*

History

02 Feb 2026, 19:56

Type Values Removed Values Added
First Time Evmapa evmapa
Evmapa
CPE cpe:2.3:a:evmapa:evmapa:*:*:*:*:*:*:*:*
References () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json - () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json - Third Party Advisory
References () https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 - () https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 - Third Party Advisory, US Government Resource

22 Jan 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-22 23:15

Updated : 2026-02-02 19:56


NVD link : CVE-2025-54816

Mitre link : CVE-2025-54816

CVE.ORG link : CVE-2025-54816


JSON object : View

Products Affected

evmapa

  • evmapa
CWE
CWE-306

Missing Authentication for Critical Function