Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
ZLAN Information Technology Co. did not respond to CISA's attempts at coordination. Users of ZLAN5143D devices are encouraged to contact ZLAN and keep their systems up to date. https://www.zlmcu.com/en/contatct_us.htm https://www.zlmcu.com/en/contatct_us.htm
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zlan Information Technology Co.
Zlan Information Technology Co. zlan5143d |
|
| Vendors & Products |
Zlan Information Technology Co.
Zlan Information Technology Co. zlan5143d |
Wed, 11 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication. | |
| Title | ZLAN Information Technology ZLAN5143D Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-11T16:45:23.479Z
Reserved: 2026-01-29T21:07:29.858Z
Link: CVE-2026-24789
Updated: 2026-02-11T16:45:13.239Z
Status : Awaiting Analysis
Published: 2026-02-11T17:16:13.040
Modified: 2026-02-11T18:06:04.010
Link: CVE-2026-24789
No data.
OpenCVE Enrichment
Updated: 2026-02-11T21:37:47Z