No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 20 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:keenetic:keeneticos:*:*:*:*:*:*:*:* |
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keenetic
Keenetic keeneticos |
|
| Vendors & Products |
Keenetic
Keenetic keeneticos |
Thu, 23 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-93 | |
| Metrics |
cvssV3_1
|
Thu, 23 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CRLF-injection in KeeneticOS before 4.3 at "/auth" API endpoint allows attackers to take over the device via adding additional users with full permissions by managing the victim to open page with exploit. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-20T17:55:15.965Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56007
Updated: 2025-10-23T16:30:24.010Z
Status : Modified
Published: 2025-10-23T15:15:39.097
Modified: 2026-05-20T20:16:33.837
Link: CVE-2025-56007
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:17:07Z