Insufficient hardening of the proxyuser account in the AiKaan IoT management platform, combined with the use of a shared, hardcoded SSH private key, allows remote attackers to authenticate to the cloud controller, gain interactive shell access, and pivot into other connected IoT devices. This can lead to remote code execution, information disclosure, and privilege escalation across customer environments.
                
            References
                    Configurations
                    No configuration.
History
                    23 Sep 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CWE | CWE-798 | |
| References | () https://github.com/Shubhangborkar/aikaan-vulnerabilities/blob/main/cve2-proxyuser-shell.md - | 
22 Sep 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-22 16:15
Updated : 2025-09-23 19:15
NVD link : CVE-2025-57602
Mitre link : CVE-2025-57602
CVE.ORG link : CVE-2025-57602
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
