Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Wed, 16 Jul 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point. | |
Title | Weak Session ID Check in the OmniAccess Stellar Web Management Interface | |
Weaknesses | CWE-384 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: CSA
Published: 2025-07-16T06:30:11.161Z
Updated: 2025-07-16T14:40:58.689Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52689

Updated: 2025-07-16T14:36:21.423Z

Status : Awaiting Analysis
Published: 2025-07-16T07:15:23.190
Modified: 2025-07-16T15:15:32.020
Link: CVE-2025-52689

No data.