Affected devices do not properly enforce user authentication on specific API endpoints. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that the attacker has learned the identity of a legitimate user.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-01-13 10:15
Updated : 2026-01-13 14:03
NVD link : CVE-2025-40805
Mitre link : CVE-2025-40805
CVE.ORG link : CVE-2025-40805
JSON object : View
Products Affected
No product.
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
