A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md | Exploit Mitigation Third Party Advisory |
| https://vuldb.com/?ctiid.295173 | Permissions Required VDB Entry |
| https://vuldb.com/?id.295173 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.497533 | Third Party Advisory VDB Entry |
| https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md | Exploit Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-12 18:15
Updated : 2025-10-17 15:18
NVD link : CVE-2025-1214
Mitre link : CVE-2025-1214
CVE.ORG link : CVE-2025-1214
JSON object : View
Products Affected
pihome
- maxair
