70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-180/ |
![]() ![]() |
History
Fri, 06 Jun 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | 70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability. The specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996. | |
Title | 70mai A510 Use of Default Password Authentication Bypass Vulnerability | |
Weaknesses | CWE-1393 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-06-06T18:53:31.631Z
Updated: 2025-06-06T18:53:31.631Z
Reserved: 2025-03-24T19:43:13.246Z
Link: CVE-2025-2766

No data.

Status : Received
Published: 2025-06-06T19:15:26.930
Modified: 2025-06-06T19:15:26.930
Link: CVE-2025-2766

No data.