Kunbus RevPi Webstatus Authentication Bypass
What is the Vulnerability? FortiGuard Labs has detected active attack attempts targeting the Kunbus Revolution Pi Webstatus authentication bypass vulnerability (CVE-2025-41646), a flaw that allows remote attackers to log in without a password by exploiting improper credential handling. A public proof-of-concept is already available, increasing the likelihood of widespread exploitation. The vulnerability can be triggered…
|
What is the Vulnerability? |
FortiGuard Labs has detected active attack attempts targeting the Kunbus Revolution Pi Webstatus authentication bypass vulnerability (CVE-2025-41646), a flaw that allows remote attackers to log in without a password by exploiting improper credential handling. A public proof-of-concept is already available, increasing the likelihood of widespread exploitation. The vulnerability can be triggered over the network without user interaction, granting attackers full administrative control of affected devices. Since Revolution Pi systems are frequently deployed in industrial and operational technology environments, successful exploitation could lead to unauthorized system control, data manipulation, or disruption of critical processes. CISA has issued an ICS/OT advisory for this threat and urges organizations to update their systems immediately. |
|
What is the recommended Mitigation? |
• Upgrade affected systems to Revolution Pi Webstatus version 2.4.6, which addresses and corrects the authentication logic flaw. |
|
What FortiGuard Coverage is available? |
• FortiGuard IPS protection is available to detect and block attacks related to (CVE-2025-41646) Kunbus RevPi Webstatus Authentication Bypass. |
