CVE-2026-24346

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to access protected administrative areas of the EZCast Pro II web application using well-known default credentials. Anyone using EZCast Pro II version 1.17478.146 with default configuration is affected, potentially exposing sensitive administrative functions to unauthorized users.

💻 Affected Systems

Products:
  • EZCast Pro II
Versions: 1.17478.146
Operating Systems: Embedded/Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using default administrative credentials that have not been changed from factory settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the device allowing attackers to reconfigure settings, install malicious firmware, pivot to internal networks, or use the device as an attack platform.

🟠

Likely Case

Unauthorized access to administrative controls allowing configuration changes, viewing of sensitive information, or disruption of device functionality.

🟢

If Mitigated

Limited impact if strong authentication controls are implemented and default credentials are changed.

🌐 Internet-Facing: HIGH - Devices exposed to the internet with default credentials are trivially exploitable by automated scanning tools.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the device.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of default credentials and network access to the Admin UI. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://hub.ntc.swiss/ntcf-2025-13993

Restart Required: No

Instructions:

1. Access the Admin UI 2. Navigate to user/security settings 3. Change default administrative credentials to strong, unique passwords 4. Ensure all user accounts have non-default credentials

🔧 Temporary Workarounds

Change Default Credentials

all

Manually change the default administrative password to a strong, unique password

Network Segmentation

all

Restrict network access to the Admin UI using firewall rules or network segmentation

🧯 If You Can't Patch

  • Implement network access controls to restrict Admin UI access to trusted IP addresses only
  • Monitor authentication logs for failed login attempts and brute force attacks

🔍 How to Verify

Check if Vulnerable:

Attempt to log into the Admin UI using known default credentials (check vendor documentation for defaults)

Check Version:

Check device web interface or system information page for firmware version

Verify Fix Applied:

Verify that default credentials no longer work and only strong, unique credentials provide access

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication with default credentials
  • Multiple failed login attempts followed by success
  • Authentication from unexpected IP addresses

Network Indicators:

  • HTTP requests to /admin or administrative endpoints from unauthorized sources
  • Traffic patterns indicating credential guessing

SIEM Query:

source="ezcast" AND (event_type="authentication_success" AND user="admin") OR (event_type="authentication_failure" AND count>10)

🔗 References

📤 Share & Export