CWE-1392

Use of Default Credentials

45 CVEs Avg CVSS 7.2 MITRE
12
CRITICAL
14
HIGH
13
MEDIUM
4
LOW
14
POC
0
KEV

Monthly

CVE-2023-27573 CRITICAL Act Now

Default credentials in netbox-docker before 2.5.0.

Docker
NVD GitHub
CVSS 3.1
9.0
EPSS
0.0%
CVE-2026-28713 HIGH This Week

Acronis Cyber Protect and Agent virtual appliances on VMware contain hardcoded default credentials for local privileged accounts, allowing attackers with network access and user interaction to gain high-level system access and potentially modify or disrupt backup operations. The vulnerability affects Cyber Protect Cloud Agent (VMware) before build 36943 and Cyber Protect 17 (VMware) before build 41186, with no patch currently available. An attacker exploiting this could achieve privilege escalation and lateral movement within virtualized environments.

Information Disclosure Cyber Protect Agent
NVD
CVSS 3.0
7.1
EPSS
0.0%
CVE-2026-27751 CRITICAL Act Now

Default credentials in SODOLA SL902-SWTGW124AS network switch firmware allow unauthenticated remote access. Default credentials are publicly known, enabling complete device takeover.

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-26341 CRITICAL POC Act Now

Default credentials in Tattile Smart+, Vega, and Basic ANPR camera families firmware 1.181.5 and prior. License plate recognition cameras ship with known default credentials. PoC available.

Authentication Bypass Vega11 Firmware Axle Counter Firmware Vega33 Firmware Anpr Mobile Firmware +2
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-26366 CRITICAL POC Act Now

eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.

Information Disclosure Enet Smart Home
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-54756 HIGH This Week

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. [CVSS 8.4 HIGH]

Information Disclosure
NVD GitHub
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-1972 MEDIUM POC This Month

Edimax BR-6208AC firmware versions prior to 2_1.02 contain an authentication bypass in the auth_check_userpass2 function that allows remote attackers to gain access using default credentials through manipulation of username and password parameters. Public exploit code exists for this vulnerability, and the affected product is end-of-life with no vendor patches planned. Organizations still operating this router should immediately restrict network access or plan for replacement.

Information Disclosure Br 6208ac Firmware
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-1803 HIGH POC This Week

Ziroom ZHOME A0101 devices running version 1.0.1.0 use hardcoded default credentials in the Dropbear SSH service, enabling unauthenticated remote attackers to gain unauthorized access with high impact to confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response. While exploitation requires specific conditions, security professionals should prioritize assessment and credential rotation for affected systems.

Ssh
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-7740 Monitor

Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authenticated local attacker to use an admin account created during product deployment.

Information Disclosure
NVD
EPSS
0.0%
CVE-2025-59108 Monitor

By default, the password for the Access Manager's web interface, is set to 'admin'. In the tested version changing the password was not enforced.

Information Disclosure
NVD
EPSS
0.1%
CVE-2023-27573
EPSS 0% CVSS 9.0
CRITICAL Act Now

Default credentials in netbox-docker before 2.5.0.

Docker
NVD GitHub
CVE-2026-28713
EPSS 0% CVSS 7.1
HIGH This Week

Acronis Cyber Protect and Agent virtual appliances on VMware contain hardcoded default credentials for local privileged accounts, allowing attackers with network access and user interaction to gain high-level system access and potentially modify or disrupt backup operations. The vulnerability affects Cyber Protect Cloud Agent (VMware) before build 36943 and Cyber Protect 17 (VMware) before build 41186, with no patch currently available. An attacker exploiting this could achieve privilege escalation and lateral movement within virtualized environments.

Information Disclosure Cyber Protect Agent
NVD
CVE-2026-27751
EPSS 0% CVSS 9.8
CRITICAL Act Now

Default credentials in SODOLA SL902-SWTGW124AS network switch firmware allow unauthenticated remote access. Default credentials are publicly known, enabling complete device takeover.

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVE-2026-26341
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Default credentials in Tattile Smart+, Vega, and Basic ANPR camera families firmware 1.181.5 and prior. License plate recognition cameras ship with known default credentials. PoC available.

Authentication Bypass Vega11 Firmware Axle Counter Firmware +4
NVD
CVE-2026-26366
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

eNet SMART HOME server ships with default credentials (user:user, admin:admin) (CVSS 9.8) enabling immediate administrative access to the smart home system.

Information Disclosure Enet Smart Home
NVD
CVE-2025-54756
EPSS 0% CVSS 8.4
HIGH This Week

BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. [CVSS 8.4 HIGH]

Information Disclosure
NVD GitHub
CVE-2026-1972
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Edimax BR-6208AC firmware versions prior to 2_1.02 contain an authentication bypass in the auth_check_userpass2 function that allows remote attackers to gain access using default credentials through manipulation of username and password parameters. Public exploit code exists for this vulnerability, and the affected product is end-of-life with no vendor patches planned. Organizations still operating this router should immediately restrict network access or plan for replacement.

Information Disclosure Br 6208ac Firmware
NVD VulDB
CVE-2026-1803
EPSS 0% CVSS 8.1
HIGH POC This Week

Ziroom ZHOME A0101 devices running version 1.0.1.0 use hardcoded default credentials in the Dropbear SSH service, enabling unauthenticated remote attackers to gain unauthorized access with high impact to confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response. While exploitation requires specific conditions, security professionals should prioritize assessment and credential rotation for affected systems.

Ssh
NVD GitHub VulDB
CVE-2025-7740
EPSS 0%
Monitor

Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authenticated local attacker to use an admin account created during product deployment.

Information Disclosure
NVD
CVE-2025-59108
EPSS 0%
Monitor

By default, the password for the Access Manager's web interface, is set to 'admin'. In the tested version changing the password was not enforced.

Information Disclosure
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy