CVE-2019-25325
Description
Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated SQL injection in Thrive Smart Home 1.1's checklogin.php lets attackers bypass authentication entirely.
Thrive Smart Home 1.1, a home automation system, suffers from an SQL injection vulnerability in the checklogin.php script. The user POST parameter is passed directly into SQL queries without sanitization, allowing attackers to manipulate the query logic [3][4]. This is a classic authentication bypass flaw where the input is not properly validated before being used in a database operation.
Attackers do not need any authentication to exploit this vulnerability. By sending a crafted POST request to the login endpoint with a malicious payload like ' or 1=1# in the 'user' field, the injected SQL code alters the query to always return a valid result, effectively bypassing the credential check [1][3]. No special network position is required; the attack can be performed remotely over HTTP.
Successful exploitation grants the attacker unauthorized access to the Thrive Smart Home application's administrative interface. This could allow an attacker to control smart home devices, access sensitive configuration data, or pivot further into the network. The vulnerability was discovered and reported by Gjoko 'LiquidWorm' Krstic of Zero Science Lab [1][4].
Public exploit code exists on multiple platforms [3][4] and the flaw is listed in CISA's Known Exploited Vulnerabilities catalog. Users of Thrive Smart Home 1.1 should assume the software is end-of-life; no patch is available. The only mitigation is to restrict network access to the application and consider replacing the system.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- cxsecurity.com/issue/WLB-2020010019nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/173728nvd
- packetstorm.news/files/id/155797nvd
- www.exploit-db.com/exploits/47814nvd
- www.vulncheck.com/advisories/thrive-smart-home-smart-home-improper-limitation-onvd
- www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.phpnvd
News mentions
0No linked articles in our index yet.