FaceSentry Access Control System 6.4.8 contains a critical authentication vulnerability with hard-coded SSH credentials for the wwwuser account. Attackers can leverage the insecure sudoers configuration to escalate privileges and gain root access by executing sudo commands without authentication.
References
| Link | Resource |
|---|---|
| http://www.iwt.com.hk | Product |
| https://www.exploit-db.com/exploits/47067 | Exploit Third Party Advisory VDB Entry |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5526.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5526.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-24 20:15
Updated : 2025-12-31 14:15
NVD link : CVE-2019-25241
Mitre link : CVE-2019-25241
CVE.ORG link : CVE-2019-25241
JSON object : View
Products Affected
iwt
- facesentry_access_control_system
- facesentry_access_control_system_firmware
CWE
CWE-798
Use of Hard-coded Credentials
