username and password to be set to blank values. Once applied, the
device permits authentication with empty credentials over the web
management interface and Telnet service. This effectively disables
authentication across all critical management channels, allowing any
network-adjacent attacker to gain full administrative control without
credentials.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Jinan USR IOT Technology Limited (PUSR) has stated that the product is end-of-life, and there are no plans to patch. Users of PUSR USR-W610 devices are encouraged to contact PUSR and keep their systems up to date.
Fri, 20 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The web management interface of the device allows the administrator username and password to be set to blank values. Once applied, the device permits authentication with empty credentials over the web management interface and Telnet service. This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative control without credentials. | |
| Title | Jinan USR IOT Technology Limited (PUSR) USR-W610 Weak Password Requirements | |
| Weaknesses | CWE-521 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-20T20:03:22.841Z
Reserved: 2026-02-10T15:52:10.231Z
Link: CVE-2026-25715
No data.
Status : Awaiting Analysis
Published: 2026-02-20T17:25:53.293
Modified: 2026-02-20T18:57:15.973
Link: CVE-2026-25715
No data.
OpenCVE Enrichment
No data.