CVE-2025-13955

N/A Unknown

📋 TL;DR

This vulnerability allows attackers within Wi-Fi range to calculate the default password for EZCast Pro II dongles using observable device identifiers. Attackers can gain unauthorized access to the device's access point functionality. Only users of EZCast Pro II version 1.17478.146 with default Wi-Fi settings are affected.

💻 Affected Systems

Products:
  • EZCast Pro II
Versions: 1.17478.146
Operating Systems: Not OS-dependent - hardware dongle
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices using default Wi-Fi passwords. Devices with custom passwords are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the dongle, potentially intercepting or manipulating casted content, accessing connected networks, or using the device as an entry point to internal networks.

🟠

Likely Case

Unauthorized users connect to the dongle's Wi-Fi network, disrupting legitimate casting sessions or accessing limited device functionality.

🟢

If Mitigated

No impact if custom Wi-Fi passwords are used or if the device is not in Wi-Fi access point mode.

🌐 Internet-Facing: LOW (requires physical proximity to Wi-Fi signal)
🏢 Internal Only: MEDIUM (attackers must be within Wi-Fi range but could be inside facilities)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires physical proximity to Wi-Fi signal and knowledge of the password calculation algorithm. No authentication needed to attempt connection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.ncsc.admin.ch/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/schwachstelle-melden/cvd-cases/cvd-case-1-test.html

Restart Required: No

Instructions:

No official patch available. Refer to workarounds section for mitigation steps.

🔧 Temporary Workarounds

Change Default Wi-Fi Password

all

Set a strong, unique password for the dongle's Wi-Fi access point functionality

Connect to EZCast Pro II Wi-Fi network
Access web interface (typically 192.168.203.1)
Navigate to Wi-Fi settings
Change password to strong random value

Disable Wi-Fi Access Point Mode

all

Use alternative connection methods (HDMI, wired network) instead of Wi-Fi access point

Access device settings
Disable 'Wi-Fi AP' or 'Hotspot' functionality

🧯 If You Can't Patch

  • Physically secure devices to prevent unauthorized proximity access
  • Segment network to isolate EZCast devices from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if device is using default Wi-Fi password by attempting to calculate password from MAC address or device identifier visible in Wi-Fi network name

Check Version:

Check device firmware version in web interface at 192.168.203.1 or via device display

Verify Fix Applied:

Attempt to connect to device Wi-Fi using calculated default password - should fail if properly mitigated

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed Wi-Fi connection attempts
  • Unexpected devices connected to EZCast Wi-Fi network

Network Indicators:

  • Unusual traffic from EZCast device
  • Multiple MAC addresses attempting connections

SIEM Query:

source="ezcast" AND (event_type="auth_failure" OR event_type="new_connection")

🔗 References

📤 Share & Export