Filtered by vendor Iptime Subscriptions
Filtered by product Smart Firmware Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2026-26342 2 Iptime, Tattile 25 Smart Firmware, Anpr Mobile, Anpr Mobile Firmware and 22 more 2026-03-05 9.8 Critical
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.
CVE-2026-26341 2 Iptime, Tattile 25 Smart Firmware, Anpr Mobile, Anpr Mobile Firmware and 22 more 2026-03-05 9.8 Critical
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.
CVE-2026-26340 2 Iptime, Tattile 25 Smart Firmware, Anpr Mobile, Anpr Mobile Firmware and 22 more 2026-03-05 7.5 High
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.
CVE-2025-55423 1 Iptime 326 A1, A1004, A1004 Firmware and 323 more 2026-01-30 9.8 Critical
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.