Vulnerabilities (CVE)

Filtered by CWE-798
Total 1635 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-50696 1 Sound4 17 Big Voice2, Big Voice2 Firmware, Big Voice4 and 14 more 2026-01-16 N/A 9.8 CRITICAL
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain hardcoded credentials embedded in server binaries that cannot be modified through normal device operations. Attackers can leverage these static credentials to gain unauthorized access to the device across Linux and Windows distributions without requiring user interaction.
CVE-2025-1029 1 Utarit 1 Soliclub 2026-01-16 N/A 7.5 HIGH
Use of Hard-coded Credentials vulnerability in Utarit Information Services Inc. SoliClub allows Read Sensitive Constants Within an Executable.This issue affects SoliClub: from 5.2.4 before 5.3.7.
CVE-2025-7358 1 Utarit 1 Soliclub 2026-01-16 N/A 7.5 HIGH
Use of Hard-coded Credentials vulnerability in Utarit Informatics Services Inc. SoliClub allows Authentication Abuse.This issue affects SoliClub: before 5.3.7.
CVE-2025-33222 1 Nvidia 1 Isaac Launchable 2026-01-15 N/A 9.8 CRITICAL
NVIDIA Isaac Launchable contains a vulnerability where an attacker could exploit a hard-coded credential issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, and data tampering.
CVE-2022-26138 1 Atlassian 3 Confluence Data Center, Confluence Server, Questions For Confluence 2026-01-14 N/A 9.8 CRITICAL
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
CVE-2025-36747 1 Growatt 2 Shine Lan-x, Shine Lan-x Firmware 2026-01-14 N/A 9.8 CRITICAL
ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.
CVE-2025-36752 1 Growatt 2 Shine Lan-x, Shine Lan-x Firmware 2026-01-14 N/A 9.8 CRITICAL
Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this is effectively backdoor for all devices utilizing a Growatt ShineLan-X communication dongle.
CVE-2025-26476 1 Dell 2 Elastic Cloud Storage, Objectscale 2026-01-14 N/A 8.4 HIGH
Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0, contain a Use of Hard-coded Cryptographic Key vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Unauthorized access.
CVE-2025-38741 1 Dell 1 Enterprise Sonic Os 2026-01-14 N/A 7.5 HIGH
Dell Enterprise SONiC OS, version 4.5.0, contains a cryptographic key vulnerability in SSH. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to unauthorized access to communication.
CVE-2025-35451 4 Multicam-systems, Ptzoptics, Smtav and 1 more 102 Mcamii Ptz, Mcamii Ptz Firmware, Ndi Fixed Camera and 99 more 2026-01-14 N/A 9.8 CRITICAL
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
CVE-2025-45466 1 Unitree 2 Go1, Go1 Firmware 2026-01-12 N/A 8.8 HIGH
Unitree Go1 <= Go1_2022_05_11 is vulnerale to Incorrect Access Control due to authentication credentials being hardcoded in plaintext.
CVE-2025-65855 1 Netun 2 Helpflash Iot, Helpflash Iot Firmware 2026-01-06 N/A 6.6 MEDIUM
The OTA firmware update mechanism in Netun Solutions HelpFlash IoT (firmware v18_178_221102_ASCII_PRO_1R5_50) uses hard-coded WiFi credentials identical across all devices and does not authenticate update servers or validate firmware signatures. An attacker with brief physical access can activate OTA mode (8-second button press), create a malicious WiFi AP using the known credentials, and serve malicious firmware via unauthenticated HTTP to achieve arbitrary code execution on this safety-critical emergency signaling device.
CVE-2018-25138 1 Flir 2 Flir Ax8, Flir Ax8 Firmware 2026-01-05 N/A 9.8 CRITICAL
FLIR AX8 Thermal Camera 1.32.16 contains hard-coded SSH and web panel credentials that cannot be changed through normal camera operations. Attackers can exploit these persistent credentials to gain unauthorized shell access and login to multiple camera interfaces using predefined username and password combinations.
CVE-2025-64778 1 Mirion 1 Biodose\/nmis 2026-01-02 N/A 7.3 HIGH
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
CVE-2025-68948 1 B3log 1 Siyuan 2026-01-02 N/A 8.1 HIGH
SiYuan is self-hosted, open source personal knowledge management software. In versions 3.5.1 and prior, the SiYuan Note application utilizes a hardcoded cryptographic secret for its session store. This unsafe practice renders the session encryption ineffective. Since the sensitive AccessAuthCode is stored within the session cookie, an attacker who intercepts or obtains a user's encrypted session cookie (e.g., via session hijacking) can locally decrypt it using the public key. Once decrypted, the attacker can retrieve the AccessAuthCode in plain text and use it to authenticate or take over the session.
CVE-2025-67418 1 Oxygenz 1 Clipbucket 2026-01-02 N/A 9.8 CRITICAL
ClipBucket 5.5.2 is affected by an improper access control issue where the product is shipped or deployed with hardcoded default administrative credentials. An unauthenticated remote attacker can log in to the administrative panel using these default credentials, resulting in full administrative control of the application.
CVE-2019-25241 1 Iwt 2 Facesentry Access Control System, Facesentry Access Control System Firmware 2025-12-31 N/A 9.8 CRITICAL
FaceSentry Access Control System 6.4.8 contains a critical authentication vulnerability with hard-coded SSH credentials for the wwwuser account. Attackers can leverage the insecure sudoers configuration to escalate privileges and gain root access by executing sudo commands without authentication.
CVE-2024-22770 1 Hitron 2 Hvr-16781, Hvr-16781 Firmware 2025-12-31 N/A 7.4 HIGH
Improper Input Validation in Hitron Systems DVR HVR-16781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
CVE-2024-22768 1 Hitron 2 Hvr-4781, Hvr-4781 Firmware 2025-12-31 N/A 7.4 HIGH
Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
CVE-2024-22772 1 Hitron 2 Lguvr-8h, Lguvr-8h Firmware 2025-12-31 N/A 7.4 HIGH
Improper Input Validation in Hitron Systems DVR LGUVR-8H 1.02~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.