QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerability that allows unauthenticated attackers to access administrative login information through an unprotected XML file. Attackers can retrieve hardcoded admin credentials by requesting the '/xml/User/User.xml' file, enabling direct authentication bypass.
References
| Link | Resource |
|---|---|
| http://www.howfor.com | Product |
| https://www.exploit-db.com/exploits/48748 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/qihang-media-web-digital-signage-cleartext-credentials-disclosure | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5579.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-17 19:21
NVD link : CVE-2020-36896
Mitre link : CVE-2020-36896
CVE.ORG link : CVE-2020-36896
JSON object : View
Products Affected
howfor
- qihang_media_web_digital_signage
CWE
CWE-522
Insufficiently Protected Credentials
