Vatilon v1.12.37-20240124 was discovered to transmit user credentials in plaintext.
References
| Link | Resource |
|---|---|
| http://vatilon.com | Product |
| https://github.com/Remenis/CVE-2025-67159 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
30 Jan 2026, 01:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:vatilon:pa4:-:*:*:*:*:*:*:* cpe:2.3:o:vatilon:pa4_firmware:1.12.37-20240124:*:*:*:*:*:*:* |
|
| First Time |
Vatilon
Vatilon pa4 Vatilon pa4 Firmware |
|
| References | () http://vatilon.com - Product | |
| References | () https://github.com/Remenis/CVE-2025-67159 - Exploit, Third Party Advisory |
06 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-319 |
02 Jan 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 17:16
Updated : 2026-01-30 01:44
NVD link : CVE-2025-67159
Mitre link : CVE-2025-67159
CVE.ORG link : CVE-2025-67159
JSON object : View
Products Affected
vatilon
- pa4_firmware
- pa4
CWE
CWE-319
Cleartext Transmission of Sensitive Information
