CVE-2026-25803

9.8 CRITICAL

📋 TL;DR

3DP-MANAGER versions 2.0.1 and earlier automatically create an administrative account with default credentials (admin/admin) on first initialization. Attackers with network access to the login interface can use these credentials to gain full administrative control, allowing them to manage VPN tunnels and system settings. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • 3DP-MANAGER
Versions: 2.0.1 and prior
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations are vulnerable by default unless credentials are manually changed after first initialization.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the 3DP-MANAGER system, allowing attackers to create/manage VPN tunnels, modify system settings, and potentially pivot to other network resources.

🟠

Likely Case

Unauthorized administrative access leading to VPN tunnel manipulation and system configuration changes.

🟢

If Mitigated

No impact if default credentials are changed immediately after installation or if network access is restricted.

🌐 Internet-Facing: HIGH - Internet-facing instances are trivially exploitable with known credentials.
🏢 Internal Only: HIGH - Even internal instances are vulnerable to any network-accessible attacker.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the login interface and knowledge of default credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.2

Vendor Advisory: https://github.com/denpiligrim/3dp-manager/security/advisories/GHSA-5x57-h7cw-9jmw

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install version 2.0.2 from the official repository. 3. Restart the 3DP-MANAGER service. 4. Verify the fix by checking the version and attempting to login with default credentials.

🔧 Temporary Workarounds

Change Default Credentials

all

Immediately change the default admin password after installation.

Login to 3DP-MANAGER admin interface and navigate to user settings to change password

Network Access Restriction

linux

Restrict network access to the 3DP-MANAGER interface using firewall rules.

iptables -A INPUT -p tcp --dport [3DP-MANAGER_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [3DP-MANAGER_PORT] -j DROP

🧯 If You Can't Patch

  • Change the default admin password immediately if not already done.
  • Implement strict network access controls to limit who can reach the 3DP-MANAGER interface.

🔍 How to Verify

Check if Vulnerable:

Check if you can login to the 3DP-MANAGER interface using username 'admin' and password 'admin'.

Check Version:

Check the version displayed in the 3DP-MANAGER web interface or configuration files.

Verify Fix Applied:

Attempt to login with default credentials (admin/admin) - should fail. Verify version is 2.0.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with admin account
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • Unauthorized access to admin interface from unexpected sources
  • VPN tunnel creation/modification from unapproved users

SIEM Query:

source="3dp-manager" AND (event="login_success" AND user="admin") OR (event="config_change" AND user="admin")

🔗 References

📤 Share & Export