CVE-2025-1878
low-risk
Published 2025-03-03
A vulnerability has been found in i-Drive i11 and i12 up to 20250227 and classified as problematic. This vulnerability affects unknown code of the component WiFi. The manipulation leads to use of default password. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitation appears to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.1/10
Low
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (2)
I11 Firmware
I12 Firmware
Affected Vendors
References (4)
Third Party Advisory
https://github.com/geo-chen/i-Drive
Permissions Required
https://vuldb.com/?ctiid.298192
Permissions Required
https://vuldb.com/?id.298192
Third Party Advisory
https://vuldb.com/?submit.510949
16
/ 100
low-risk
Severity
8/34 · Low
Exploitability
1/34 · Minimal
Exposure
7/34 · Low