CVE-2018-25152
Description
Ecessa Edge EV150 10.7.4 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without authentication. Attackers can craft a malicious web page with a form that submits requests to the /cgi-bin/pl_web.cgi/util_configlogin_act endpoint to add superuser accounts with arbitrary credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ecessa Edge EV150 10.7.4 is vulnerable to CSRF, allowing unauthenticated attackers to create administrative accounts via a crafted form.
Vulnerability
Overview
CVE-2018-25152 describes a cross-site request forgery (CSRF) vulnerability in the Ecessa Edge EV150 appliance running firmware version 10.7.4. The application fails to perform any validity checks on HTTP requests, allowing an attacker to trick an authenticated user's browser to perform actions with administrative privileges [2]. The root cause is the lack of CSRF tokens or other origin verification mechanisms on sensitive endpoints.
ExploitationAn attacker can craft a malicious web page containing a hidden form that submits a POST request to the /cgi-bin/pl_web.cgi/util_configlogin_act endpoint [2]. The form includes parameters to add a new superuser account (e.g., username h4x0r with password 123123) by setting user_superuser4 to on [2]. The attack requires the victim to be logged into the Ecessa interface while visiting the attacker's page; no authentication is needed for the attacker themselves [1].
ImpactSuccessful exploitation allows the attacker to create a new administrative user with full superuser privileges [2]. The attacker can then log in with those credentials and gain complete control over the device, including modifying network configuration, firewall rules, and potentially pivoting to internal networks [1].
MitigationEcessa has not released a patch for this vulnerability; the affected versions include 10.7.4, 10.6.9, 10.6.5.2, 10.5.4, 10.2.24, and 9.2.24 [2]. Users should restrict access to the management interface to trusted networks, implement additional authentication layers, or consider upgrading to a supported product line [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =10.7.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.