Incorrect access control on Dataphone A920 v2025.07.161103 exposes a service on port 8888 by default on the local network without authentication. This allows an attacker to interact with the device via a TCP socket without credentials. Additionally, sending an HTTP request to the service on port 8888 triggers an error in the response, which exposes the functionality, headers identifying Paytef dataphone packets, and the build version.
History

Thu, 30 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Paytef
Paytef dataphone A920
Vendors & Products Paytef
Paytef dataphone A920

Wed, 29 Oct 2025 17:00:00 +0000

Type Values Removed Values Added
Description Incorrect access control on Dataphone A920 v2025.07.161103 exposes a service on port 8888 by default on the local network without authentication. This allows an attacker to interact with the device via a TCP socket without credentials. Additionally, sending an HTTP request to the service on port 8888 triggers an error in the response, which exposes the functionality, headers identifying Paytef dataphone packets, and the build version.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-29T00:00:00.000Z

Updated: 2025-10-30T20:31:01.774Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61234

cve-icon Vulnrichment

Updated: 2025-10-30T20:30:54.855Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T17:15:36.330

Modified: 2025-10-30T21:15:36.677

Link: CVE-2025-61234

cve-icon Redhat

No data.