CVE-2026-25803
📋 TL;DR
3DP-MANAGER versions 2.0.1 and earlier automatically create an administrative account with default credentials (admin/admin) on first initialization. Attackers with network access to the login interface can use these credentials to gain full administrative control, allowing them to manage VPN tunnels and system settings. All users running vulnerable versions are affected.
💻 Affected Systems
- 3DP-MANAGER
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of the 3DP-MANAGER system, allowing attackers to create/manage VPN tunnels, modify system settings, and potentially pivot to other network resources.
Likely Case
Unauthorized administrative access leading to VPN tunnel manipulation and system configuration changes.
If Mitigated
No impact if default credentials are changed immediately after installation or if network access is restricted.
🎯 Exploit Status
Exploitation requires only network access to the login interface and knowledge of default credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.2
Vendor Advisory: https://github.com/denpiligrim/3dp-manager/security/advisories/GHSA-5x57-h7cw-9jmw
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download and install version 2.0.2 from the official repository. 3. Restart the 3DP-MANAGER service. 4. Verify the fix by checking the version and attempting to login with default credentials.
🔧 Temporary Workarounds
Change Default Credentials
allImmediately change the default admin password after installation.
Login to 3DP-MANAGER admin interface and navigate to user settings to change password
Network Access Restriction
linuxRestrict network access to the 3DP-MANAGER interface using firewall rules.
iptables -A INPUT -p tcp --dport [3DP-MANAGER_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [3DP-MANAGER_PORT] -j DROP
🧯 If You Can't Patch
- Change the default admin password immediately if not already done.
- Implement strict network access controls to limit who can reach the 3DP-MANAGER interface.
🔍 How to Verify
Check if Vulnerable:
Check if you can login to the 3DP-MANAGER interface using username 'admin' and password 'admin'.
Check Version:
Check the version displayed in the 3DP-MANAGER web interface or configuration files.
Verify Fix Applied:
Attempt to login with default credentials (admin/admin) - should fail. Verify version is 2.0.2 or later.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login with admin account
- Configuration changes from unexpected IP addresses
Network Indicators:
- Unauthorized access to admin interface from unexpected sources
- VPN tunnel creation/modification from unapproved users
SIEM Query:
source="3dp-manager" AND (event="login_success" AND user="admin") OR (event="config_change" AND user="admin")