CVE-2026-26049
Description
The web management interface of the device renders the passwords in a plaintext input field. The current password is directly visible to anyone with access to the UI, potentially exposing administrator credentials to unauthorized observation via shoulder surfing, screenshots, or browser form caching.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The web management interface of PUSR USR-W610 routers displays the current password in plaintext, exposing administrator credentials to anyone with UI access.
Vulnerability details: The web management interface of the PUSR USR-W610 router renders the current password in a plaintext input field, rather than masking it. This design flaw means that the administrator's password is directly visible on the screen whenever the user views or edits the password field [1]. The issue affects all firmware versions up to and including 3.1.1.0 [1].
Exploitation scenario: An attacker does not need to authenticate to exploit this vulnerability; the exposure occurs simply by having access to the web interface. This could happen through shoulder surfing (looking over the administrator's shoulder), taking a screenshot of the screen, or via browser form caching that stores the plaintext value [1]. The attack vector is local or physical proximity to the device's management interface.
Impact: Successful exploitation allows an attacker to obtain valid administrator credentials, which can then be used to gain full administrative control over the device. This could lead to further compromise, including disabling authentication, authentication, denial-of-service, or theft of other user credentials [1].
Mitigation: As of the advisory publication date (February 20, 2026), the vendor has not released a patch. The affected product is known to be vulnerable, and users are advised to restrict physical and network access to the management interface as a workaround [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.