CVE-2025-1242
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Lifecycle Timeline
2Tags
Description
The administrative credentials can be extracted through application API responses, mobile application reverse engineering, and device firmware reverse engineering. The exposure may result in an attacker gaining full administrative access to the Gardyn IoT Hub exposing connected devices to malicious control.
Analysis
Hardcoded credentials extractable through API responses and mobile app reverse engineering in an enterprise application. Administrative credentials are exposed in multiple channels.
Technical Context
CWE-798 hardcoded credentials. Admin credentials are embedded in API responses and the mobile application binary, extractable through API calls or reverse engineering.
Affected Products
['Affected enterprise application']
Remediation
Remove hardcoded credentials from API responses and mobile app. Implement proper credential management.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today