CVE-2025-63208

7.5 HIGH

📋 TL;DR

This vulnerability in bridgetech VB288 Objective QoE Content Extractor firmware version 5.6.0-8 allows unauthenticated attackers to retrieve administrator passwords via the /probe/core/setup/passwd endpoint. This affects organizations using this specific firmware version for content extraction and quality monitoring. The information disclosure could lead to complete system compromise.

💻 Affected Systems

Products:
  • bridgetech VB288 Objective QoE Content Extractor
Versions: 5.6.0-8
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, leading to full system takeover, data exfiltration, and potential lateral movement within the network.

🟠

Likely Case

Attackers obtain administrator passwords and gain unauthorized access to the device, potentially modifying configurations or extracting sensitive content data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific device, though credentials would still be compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to the vulnerable endpoint returns password information without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://bridgetech.tv/

Restart Required: No

Instructions:

Check bridgetech.tv for security advisories and firmware updates. If available, download and apply the latest firmware version following vendor instructions.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

linux

Use network firewall or web application firewall to block access to /probe/core/setup/passwd endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "/probe/core/setup/passwd" --algo bm -j DROP

Network Segmentation

all

Isolate VB288 devices from untrusted networks and limit access to authorized management systems only

🧯 If You Can't Patch

  • Change all administrator passwords immediately and monitor for unauthorized access
  • Implement strict network access controls to limit who can reach the device management interface

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[device-ip]/probe/core/setup/passwd and check if password information is returned without authentication

Check Version:

Check device web interface or use vendor-specific CLI commands to display firmware version

Verify Fix Applied:

After applying workarounds or updates, verify the endpoint no longer returns password information without proper authentication

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /probe/core/setup/passwd
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unusual HTTP traffic patterns to the vulnerable endpoint
  • External IP addresses accessing the management interface

SIEM Query:

source="web_logs" AND uri="/probe/core/setup/passwd" AND response_status=200

🔗 References

📤 Share & Export