zum Inhalt springen

Cross-Site Request Forgery in Admin UI of EZCast Pro II allows attackers to bypass authorization checks and gain full access to the admin UI

Peripheral Devices

NTCF:
NTCF-2025-32832

CVE:
CVE-2026-24345

Product:
EZCast Pro II

Vendor:
NimbleTech

Criticality:
medium

Status:
pending

Discovered:
2025-07-14

Detail:
Public

Vulnerable version:
all, tested: 1.17478.146

Description

Multiple vulnerabilities have been identified in the EZCast Pro II Dongle from NimbleTech. A comprehensive list of all related vulnerabilities for this device can be found on the NTC vulnerability hub.

Mitigation

As the vendor has not yet been able to provide patches, we strongly recommend following the corresponding warning issued by the National Cyber Security Centre NCSC. Until a firmware patch is made available, users are advised to take the following immediate actions:

  • Disconnect the dongle from the local network.
  • Limit usage strictly to access point functionality to minimize the attack surface.
  • Change the default password.
Disclosure Policy

In accordance with the NTC Vulnerability Disclosure Policy, no technical details about this vulnerability will be publicly disclosed. Further details may be provided on a case by case basis. Please use the contact form and provide an explanation for your request.

Acknowledgement

The NTC appreciates the valuable contribution of Redguard AG during the exchange regarding this vulnerability.

Summary Report

The NTC will shortly publish a summary report on the security of peripheral devices.

References

 

Timeline

2025-02-09: no response from vendor despite multiple requests for status updates

2025-02-09: escalation to the NCSC

2025-07-14: initial discovery

2025-07-16: first contact to vendor

2025-07-25: private disclosure to vendor

2026-01-26: public disclosure