CVE-2023-54327
Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
30/12/2025
Last modified:
16/01/2026
Description
Tinycontrol LAN Controller 1.58a contains an authentication bypass vulnerability that allows unauthenticated attackers to change admin passwords through a crafted API request. Attackers can exploit the /stm.cgi endpoint with a specially crafted authentication parameter to disable access controls and modify administrative credentials.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tinycontrol:lan_controller_firmware:*:*:*:*:*:*:*:* | 1.58a (including) | |
| cpe:2.3:h:tinycontrol:lan_controller:3.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://www.exploit-db.com/exploits/51732
- https://www.tinycontrol.pl
- https://www.vulncheck.com/advisories/tinycontrol-lan-controller-a-authentication-bypass-via-admin-password-change
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5787.php
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5787.php



