Anevia Flamingo XL/XS 3.6.20 contains a critical vulnerability with weak default administrative credentials that can be easily guessed. Attackers can leverage these hard-coded credentials to gain full remote system control without complex authentication mechanisms.
References
| Link | Resource |
|---|---|
| https://cxsecurity.com/issue/WLB-2023060019 | Third Party Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/259059 | Third Party Advisory |
| https://packetstormsecurity.com/files/172875/Anevia-Flamingo-XL-XS-3.6.x-Default-Hardcoded-Credentials.html | Third Party Advisory |
| https://www.ateme.com/ | Product |
| https://www.vulncheck.com/advisories/anevia-flamingo-xlxs-default-credentials-authentication-bypass | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2025-12-30 23:15
Updated : 2026-01-16 19:16
NVD link : CVE-2023-53983
Mitre link : CVE-2023-53983
CVE.ORG link : CVE-2023-53983
JSON object : View
Products Affected
ateme
- flamingo_xs
- flamingo_xl_firmware
- flamingo_xl
- soaplive
- flamingo_xs_firmware
- soapsystem
CWE
CWE-798
Use of Hard-coded Credentials
