CVE-2025-4633

6.5 MEDIUM

📋 TL;DR

CVE-2025-4633 allows unauthenticated attackers to access Airpointer 2.4.107-2 web portals using default credentials. This affects all deployments using the vulnerable version with default configuration. Attackers can gain administrative access without any authentication.

💻 Affected Systems

Products:
  • Airpointer 2
Versions: 2.4.107-2
Operating Systems: Embedded/Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with web portal enabled and using default credentials. The specific default credentials are not disclosed in the CVE description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to reconfigure the device, intercept sensitive data, or use the device as an entry point into the network.

🟠

Likely Case

Unauthorized access to the web portal leading to configuration changes, data exposure, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if strong network segmentation and access controls prevent external access to the web portal.

🌐 Internet-Facing: HIGH - Web portals exposed to the internet can be directly accessed by any attacker without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of default credentials and network access to the web portal. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://jct-aq.com/products/airpointer2d/

Restart Required: No

Instructions:

1. Access the Airpointer web portal. 2. Navigate to administration settings. 3. Change default credentials to strong, unique passwords. 4. Ensure all user accounts have strong passwords.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change all default passwords on the Airpointer device

Network Segmentation

all

Restrict access to Airpointer web portal to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Airpointer web portal
  • Monitor authentication logs for unauthorized access attempts and brute force attacks

🔍 How to Verify

Check if Vulnerable:

Attempt to log into the Airpointer web portal using default credentials. If successful, the system is vulnerable.

Check Version:

Check the web portal interface or device documentation for version information. The vulnerable version is 2.4.107-2.

Verify Fix Applied:

Verify that default credentials no longer work and only strong, unique credentials provide access.

📡 Detection & Monitoring

Log Indicators:

  • Successful logins from unexpected IP addresses
  • Multiple failed login attempts followed by success
  • Authentication events using default usernames

Network Indicators:

  • HTTP/HTTPS traffic to Airpointer web portal from unauthorized sources
  • Unusual patterns of access to the web portal

SIEM Query:

source="airpointer" AND (event_type="authentication_success" AND (username="admin" OR username="root" OR username="user"))

🔗 References

📤 Share & Export