Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h238-7vfv-rhh9

Опубликовано: 07 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.

A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.

EPSS

Процентиль: 23%
0.00078
Низкий

7.5 High

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 7.5
nvd
7 месяцев назад

A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.

EPSS

Процентиль: 23%
0.00078
Низкий

7.5 High

CVSS3

Дефекты

CWE-798