Incorrect access control on Dataphone A920 v2025.07.161103 exposes a service on port 8888 by default on the local network without authentication. This allows an attacker to interact with the device via a TCP socket without credentials. Additionally, sending an HTTP request to the service on port 8888 triggers an error in the response, which exposes the functionality, headers identifying Paytef dataphone packets, and the build version.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/stuxve/expose-service-8888-dataphone |
|
History
Thu, 30 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Paytef
Paytef dataphone A920 |
|
| Vendors & Products |
Paytef
Paytef dataphone A920 |
Wed, 29 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect access control on Dataphone A920 v2025.07.161103 exposes a service on port 8888 by default on the local network without authentication. This allows an attacker to interact with the device via a TCP socket without credentials. Additionally, sending an HTTP request to the service on port 8888 triggers an error in the response, which exposes the functionality, headers identifying Paytef dataphone packets, and the build version. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-29T00:00:00.000Z
Updated: 2025-10-30T20:31:01.774Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61234
Updated: 2025-10-30T20:30:54.855Z
Status : Awaiting Analysis
Published: 2025-10-29T17:15:36.330
Modified: 2025-10-30T21:15:36.677
Link: CVE-2025-61234
No data.