CVE-2023-5222

MEDIUM EXPLOITED NUCLEI

Viessmann Vitogate 300 <2.1.3.0 - Hard-Coded Password

Title source: llm

Description

A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Exploits (1)

exploitdb WORKING POC
pythonremotehardware
https://www.exploit-db.com/exploits/51887

Nuclei Templates (1)

Viessmann Vitogate 300 - Hardcoded Password
CRITICALVERIFIEDby ritikchaddha
Shodan: title:"Vitogate 300"
FOFA: title="Vitogate 300"

Scores

CVSS v3 6.3
EPSS 0.9024
EPSS Percentile 99.6%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Details

VulnCheck KEV 2024-09-16
CWE
CWE-259
Status published
Products (1)
viessmann/vitogate_300_firmware < 2.1.3.0
Published Sep 27, 2023
Tracked Since Feb 18, 2026