VYPR
Critical severity9.8NVD Advisory· Published Aug 3, 2016· Updated May 6, 2026

CVE-2016-5667

CVE-2016-5667

Description

Crestron Electronics DM-TXRX-100-STR devices with firmware before 1.3039.00040 allow remote attackers to bypass authentication via a direct request to a page other than index.html.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Crestron DM-TXRX-100-STR devices before firmware 1.3039.00040 allow unauthenticated access to web interface pages other than index.html.

Vulnerability

The Crestron DM-TXRX-100-STR streaming encoder/decoder devices running firmware versions prior to 1.3039.00040 implement client-side authentication only for the index.html page. This allows an attacker to bypass authentication by directly requesting any other URI on the device's web management interface [1].

Exploitation

An attacker with network access to the device can send a direct HTTP request to any URI other than index.html (e.g., configuration pages or API endpoints) without providing any credentials. No user interaction or prior authentication is required [1].

Impact

Successful exploitation grants the attacker unauthenticated access to the device's web interface, potentially enabling further attacks such as reading or modifying device configuration, accessing sensitive information, or leveraging other vulnerabilities (e.g., CVE-2016-5668, CVE-2016-5670) that require prior access [1].

Mitigation

Crestron has addressed this vulnerability in firmware version 1.3039.00040. Users should update to this version or later. No workaround is available for unpatched devices [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.