Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
History

Wed, 16 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0007}


Wed, 16 Jul 2025 06:45:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
Title Weak Session ID Check in the OmniAccess Stellar Web Management Interface
Weaknesses CWE-384
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published: 2025-07-16T06:30:11.161Z

Updated: 2025-07-16T14:40:58.689Z

Reserved: 2025-06-19T06:04:41.987Z

Link: CVE-2025-52689

cve-icon Vulnrichment

Updated: 2025-07-16T14:36:21.423Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T07:15:23.190

Modified: 2025-07-16T15:15:32.020

Link: CVE-2025-52689

cve-icon Redhat

No data.