Vulnerabilites related to Zytec Dalian Zhuoyun Technology - Central Authentication Service
CVE-2025-11284 (GCVE-0-2025-11284)
Vulnerability from cvelistv5
Published
2025-10-05 05:32
Modified
2025-10-07 18:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability has been found in Zytec Dalian Zhuoyun Technology Central Authentication Service 3. Affected by this vulnerability is an unknown functionality of the file /index.php/auth/Ops/git of the component HTTP Header Handler. The manipulation of the argument Authorization leads to use of hard-coded password. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.327042 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.327042 | signature, permissions-required | |
https://vuldb.com/?submit.659701 | third-party-advisory | |
http://101.200.76.102:38765/qwertyuiop/qwsdfvbnm/1/vuldb/fbnoABGFBEGPcvgmowepgokwj293t0-23t202jk9t0.html | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zytec Dalian Zhuoyun Technology | Central Authentication Service |
Version: 3 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-11284", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-10-07T18:16:56.356023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-07T18:16:59.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "http://101.200.76.102:38765/qwertyuiop/qwsdfvbnm/1/vuldb/fbnoABGFBEGPcvgmowepgokwj293t0-23t202jk9t0.html" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "HTTP Header Handler" ], "product": "Central Authentication Service", "vendor": "Zytec Dalian Zhuoyun Technology", "versions": [ { "status": "affected", "version": "3" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "BadKitty (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Zytec Dalian Zhuoyun Technology Central Authentication Service 3. Affected by this vulnerability is an unknown functionality of the file /index.php/auth/Ops/git of the component HTTP Header Handler. The manipulation of the argument Authorization leads to use of hard-coded password. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In Zytec Dalian Zhuoyun Technology Central Authentication Service 3 wurde eine Schwachstelle gefunden. Es betrifft eine unbekannte Funktion der Datei /index.php/auth/Ops/git der Komponente HTTP Header Handler. Mit der Manipulation des Arguments Authorization mit unbekannten Daten kann eine use of hard-coded password-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgef\u00fchrt werden. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "Use of Hard-coded Password", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-255", "description": "Credentials Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-05T05:32:06.385Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-327042 | Zytec Dalian Zhuoyun Technology Central Authentication Service HTTP Header git hard-coded password", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.327042" }, { "name": "VDB-327042 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.327042" }, { "name": "Submit #659701 | https://www.zytec.cn Central Authentication Service 3 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.659701" }, { "tags": [ "exploit" ], "url": "http://101.200.76.102:38765/qwertyuiop/qwsdfvbnm/1/vuldb/fbnoABGFBEGPcvgmowepgokwj293t0-23t202jk9t0.html" } ], "timeline": [ { "lang": "en", "time": "2025-10-04T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-10-04T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-10-04T11:39:33.000Z", "value": "VulDB entry last update" } ], "title": "Zytec Dalian Zhuoyun Technology Central Authentication Service HTTP Header git hard-coded password" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-11284", "datePublished": "2025-10-05T05:32:06.385Z", "dateReserved": "2025-10-04T09:34:19.617Z", "dateUpdated": "2025-10-07T18:16:59.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }