Created
January 6, 2026 07:13
-
-
Save a2148001284/bcdda75fc8718454f16a7b9259463719 to your computer and use it in GitHub Desktop.
YongJieLi_CVE-2025-65212
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [CVE ID] | |
| CVE-2025-65212 | |
| [PRODUCT] | |
| HY511 POE Core < 2.1 && plugins <0.1 | |
| [VERSION] | |
| HY511 POE Core < 2.1 && plugins <0.1 | |
| [PROBLEM TYPE] | |
| Incorrect Access Control | |
| [DESCRIPTION] | |
| An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. | |
| The vulnerability stems from the device's insufficient cookie verification, | |
| allowing an attacker to directly request the configuration file address and download the core configuration file | |
| without logging into the device management backend. By reading the corresponding username and self-decrypted MD5 password | |
| in the core configuration file, the attacker can directly log in to the backend, thereby bypassing the front-end backend login page. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment