{"id": "CVE-2025-6763", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "
[email protected]"}], "metrics": {"cvssMetricV2": [{"type": "Secondary", "source": "
[email protected]", "cvssData": {"version": "2.0", "baseScore": 7.6, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "HIGH", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "
[email protected]", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}], "cvssMetricV40": [{"type": "Secondary", "source": "
[email protected]", "cvssData": {"Safety": "NOT_DEFINED", "version": "4.0", "Recovery": "NOT_DEFINED", "baseScore": 8.2, "Automatable": "NOT_DEFINED", "attackVector": "NETWORK", "baseSeverity": "HIGH", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "exploitMaturity": "PROOF_OF_CONCEPT", "providerUrgency": "NOT_DEFINED", "userInteraction": "NONE", "attackComplexity": "HIGH", "attackRequirements": "NONE", "privilegesRequired": "NONE", "subIntegrityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "vulnAvailabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "subConfidentialityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED"}}]}, "published": "2025-06-27T12:15:45.500", "references": [{"url": "https://github.com/zeke2997/CVE_request_comet_system", "tags": ["Exploit", "Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://github.com/zeke2997/CVE_request_comet_system#poc", "tags": ["Exploit", "Third Party Advisory"], "source": "
[email protected]"}, {"url": "https://vuldb.com/?ctiid.314074", "tags": ["Permissions Required", "VDB Entry"], "source": "
[email protected]"}, {"url": "https://vuldb.com/?id.314074", "tags": ["Third Party Advisory", "VDB Entry"], "source": "
[email protected]"}, {"url": "https://vuldb.com/?submit.599848", "tags": ["Third Party Advisory", "VDB Entry"], "source": "
[email protected]"}, {"url": "https://github.com/zeke2997/CVE_request_comet_system", "tags": ["Exploit", "Third Party Advisory"], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "
[email protected]", "description": [{"lang": "en", "value": "CWE-287"}, {"lang": "en", "value": "CWE-306"}]}, {"type": "Primary", "source": "
[email protected]", "description": [{"lang": "en", "value": "CWE-306"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability was found in Comet System T0510, T3510, T3511, T4511, T6640, T7511, T7611, P8510, P8552 and H3531 1.60. Affected by this issue is some unknown functionality of the file /setupA.cfg of the component Web-based Management Interface. Performing manipulation results in missing authentication. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been made public and could be used. There are still doubts about whether this vulnerability truly exists. The vendor explains, that \"[d]evices described at CVE are not intended to be exposed into internet and proper security of devices is to end-users.\""}, {"lang": "es", "value": "Se detect\u00f3 una vulnerabilidad cr\u00edtica en Comet System T0510, T3510, T3511, T4511, T6640, T7511, T7611, P8510, P8552 y H3531 1.60. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /setupA.cfg del componente Interfaz de Administraci\u00f3n Web. La manipulaci\u00f3n provoca la omisi\u00f3n de la autenticaci\u00f3n. Se requiere acceso a la red local para este ataque. Es un ataque de complejidad bastante alta. Parece dif\u00edcil de explotar. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."}], "lastModified": "2025-10-08T19:15:45.400", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t7611_firmware:1-5-7-5.1252:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "272FDF4F-ACCE-423D-88C3-F7220D14B23E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t7611:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E24B0044-2E20-41DA-B242-0C3AAC703A65"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t4511_firmware:1-5-7-5.1252:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B61E8D58-AD3A-42EC-8B6B-18C3BDD52C82"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t4511:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07792F16-7C5A-4558-A50F-142D31B54D24"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t0510_firmware:1-5-7-5.1252:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFDD3541-F891-47FA-8D8E-E600EDFC0897"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t0510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B9DBB818-2882-4B1E-B117-5B831C6B0FF5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t6640_firmware:1-5-7-5.1252:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52D54316-F4A8-42EC-A246-980639D7807E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t6640:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08EF6EFF-459D-4648-B5D8-15AB6A48DE78"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t3510_firmware:1-5-7-5.1252:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECFFCF0D-1043-4741-95F5-663A181F0D4A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t3510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8BF78295-5285-41DE-9631-ECA896438895"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t7511_firmware:1-5-7-5.1251:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2A8D6A7-73FE-406A-865B-38DCFFC7E676"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t7511:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC9CB6AD-807F-4DBA-B3DA-49A1B7979DBE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:t3511_firmware:1-5-7-2.1151:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14D9389E-39A2-4129-A54A-E38C2D3EDB05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:t3511:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67FD46C9-2984-410E-9C7E-31E5BA77D49D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:p8510_firmware:4-5-8-0.3488:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D0335ED-EA2E-4F74-B400-8FC756C738CE"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:p8510:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2AD06CD9-C7C0-4268-92BF-B9C348DBFA2B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:p8552_firmware:4-5-8-1.3502:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00A8789F-B60F-4E2A-90DC-FAEA3DE7A3E5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:p8552:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "31660C64-26B9-45ED-97BF-5627B0A67F57"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cometsystem:h3531_firmware:9-5-0-1.1327:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A3F1702-D397-488C-A417-F94087D6FAAB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cometsystem:h3531:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "138B7062-5C0D-4ACF-8EE0-3BB9B44F105B"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "
[email protected]"}