CVE-2025-41646

Published Jun 6, 2025

Last updated 3 months ago

CVSS critical 9.8
RevPi Webstatus

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-41646 is a vulnerability in the RevPi Webstatus application. It stems from an incorrect type conversion, which can be exploited by an unauthorized remote attacker to bypass authentication. This could lead to a complete compromise of the affected device. Specifically, the vulnerability allows a remote attacker to bypass authentication. Successful exploitation could grant the attacker full control of the device, potentially allowing them to access, modify, or delete sensitive information, and disrupt device operations. A patch is available from Kunbus, released on June 10, 2025.

Description
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
Source
info@cert.vde.com
NVD status
Analyzed
Products
revpi_status

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

info@cert.vde.com
CWE-704

Social media

Hype score
Not currently trending
  1. 🚨 A tiny misstep in KUNBUS's Revolution Pi Webstatus could lead to a big disaster! System admins, it's time to tighten those security bolts—CVE-2025-41646 is knocking! #SecurityAlert #CVE2025 #WindowsForum https://t.co/kzGrjbxwKe

    @windowsforum

    10 Jul 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨 CVE-2025-41646 - critical 🚨 RevPi Webstatus <= v2.4.5 - Authentication Bypass > An unauthorized remote attacker can bypass the authentication of the affected softwar... 👾 https://t.co/r068i0s00O @pdnuclei #NucleiTemplates #cve

    @pdnuclei_bot

    7 Jul 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2025-41646 Critical auth bypass in RevPi Webstatus (<= v2.4.5) ⚠️ Affects ICS/OT Root Cause: Backend accepts JSON boolean true in place of the expected password hash - weak equality comparison PoC: Pass { "hashcode": true } to login --> full access! Patch: Update

    @win3zz

    2 Jul 2025

    9536 Impressions

    40 Retweets

    157 Likes

    68 Bookmarks

    1 Reply

    0 Quotes

  4. Critical: CVE-2025-41646 lets remote attackers bypass auth & take over Kunbus RevPi via type conversion flaw. Patch now! Details: https://t.co/g4y2xYip0C #OffSeq #CVE202541646 #CyberSecurity #ICS #IoT https://t.co/gzVDg14wRf

    @offseq

    7 Jun 2025

    53 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. CVE-2025-41646 An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise… https://t.co/ZcDGfpV7Vq

    @CVEnew

    6 Jun 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. [CVE-2025-41646: CRITICAL] An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device#cve,CVE-2025-41646,#cybersecurity https://t.co/Bp6ffwl1Rj https://t.co/y

    @CveFindCom

    6 Jun 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations