FKIE_CVE-2025-63207
Vulnerability from fkie_nvd - Published: 2025-11-19 18:15 - Updated: 2026-01-15 19:55
Severity ?
Summary
The R.V.R Elettronica TEX product (firmware TEXL-000400, Web GUI TLAN-000400) is vulnerable to broken access control due to improper authentication checks on the /_Passwd.html endpoint. An attacker can send an unauthenticated POST request to change the Admin, Operator, and User passwords, resulting in complete system compromise.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| rvr | tex30lcd\/s_firmware | texl-000400 | |
| rvr | tex30lcd\/s | - | |
| rvr | tex50lcd\/s_firmware | texl-000400 | |
| rvr | tex50lcd\/s | - | |
| rvr | tex100lcd\/s_firmware | texl-000400 | |
| rvr | tex100lcd\/s | - | |
| rvr | tex150lcd\/s_firmware | texl-000400 | |
| rvr | tex150lcd\/s | - | |
| rvr | tex300lcd_firmware | texl-000400 | |
| rvr | tex300lcd | - | |
| rvr | tex502lcd_firmware | texl-000400 | |
| rvr | tex502lcd | - | |
| rvr | tex702lcd_firmware | texl-000400 | |
| rvr | tex702lcd | - | |
| rvr | tex3500lcd_firmware | texl-000400 | |
| rvr | tex3500lcd | - | |
| rvr | tex1002lcd_firmware | texl-000400 | |
| rvr | tex1002lcd | - | |
| rvr | tex2000light_firmware | texl-000400 | |
| rvr | tex2000light | - | |
| rvr | tex2500lcd_firmware | texl-000400 | |
| rvr | tex2500lcd | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex30lcd\\/s_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDF5675-06D9-4A01-9490-A9D83F1BA254",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex30lcd\\/s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53A05670-711A-4D6F-89BB-8849DE507C76",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex50lcd\\/s_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB3442C-B734-4A95-A25D-CF99E07E588B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex50lcd\\/s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF54374-2D10-44DC-B481-F2449F552BB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex100lcd\\/s_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "B85488D3-A8E1-4175-83F9-CAE585C4DAB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex100lcd\\/s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F185C9-A27D-4AFC-A54A-1C44802A5A66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex150lcd\\/s_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "5A48CEA2-0AD8-4B71-A97D-08E7D08ED47B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex150lcd\\/s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E75BDA11-64D1-4B95-91E6-91AFB96F4645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex300lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "C03FFF4B-9FD0-4B0C-97B3-A3242FEA5997",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex300lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA92AF5-0B36-4302-8883-8BA850A7F14F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex502lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "0355114A-0AC4-48F9-B8C8-024F10DF26CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex502lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA1BF06A-C075-4800-8148-98B7893EE420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex702lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2E4711-65E2-4E5A-8289-1C363C1604F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex702lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC81BA3-7998-40BB-BE4C-3B356B6E24AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex3500lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "62922A5A-4B27-46B6-8BAE-8C2C2EE6874A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex3500lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5ADADE-4D33-40D0-ACAC-B67E444E82E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex1002lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "D62504CB-796F-4B47-BB9C-39C349C28A9A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex1002lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A99A80B0-50CD-4115-A161-F4AEFF2E5931",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex2000light_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B77727-86B7-4590-95CA-928657E82326",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex2000light:-:*:*:*:*:*:*:*",
"matchCriteriaId": "636F6C0B-2756-47D1-9699-3F8A51C698A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rvr:tex2500lcd_firmware:texl-000400:*:*:*:*:*:*:*",
"matchCriteriaId": "34614E9B-4BC0-45BE-945D-3752697AC709",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rvr:tex2500lcd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4777DA5E-B154-4FAD-920C-95635C8EA6B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The R.V.R Elettronica TEX product (firmware TEXL-000400, Web GUI TLAN-000400) is vulnerable to broken access control due to improper authentication checks on the /_Passwd.html endpoint. An attacker can send an unauthenticated POST request to change the Admin, Operator, and User passwords, resulting in complete system compromise."
}
],
"id": "CVE-2025-63207",
"lastModified": "2026-01-15T19:55:05.057",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-19T18:15:48.793",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63207_RVR%20Elettronica%20TEX%20Broken%20Access%20Control"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.rvr.it/en/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63207_RVR%20Elettronica%20TEX%20Broken%20Access%20Control"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…