CVE-2019-25322
Published: 12 February 2026
Summary
CVE-2019-25322 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Zoneregeling (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Enables users to notice when hard-coded credentials have been exploited for unauthorized access.
Security training explicitly warns against hard-coded credentials, lowering their use in systems.
Policy and procedures prohibit hard-coded credentials in favor of managed authentication.
External identity providers eliminate the need for hard-coded credentials in applications.
Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.
Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.
Planned investment enables secure credential storage and management systems instead of hard-coded credentials.
NVD Description
Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields.
Deeper analysisAI
CVE-2019-25322 is a hardcoded credentials vulnerability in Heatmiser Netmonitor version 3.03. The flaw exists in the networkSetup.htm page, where the device exposes predictable admin login credentials—username 'admin' and password 'admin'—within hidden form input fields. This issue corresponds to CWE-798 (Use of Hard-coded Credentials) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact from network-accessible exploitation.
Any remote attacker with network access to the device can exploit this vulnerability without authentication privileges, user interaction, or elevated complexity. By submitting the hardcoded credentials through the networkSetup.htm page, attackers gain unauthorized administrative access to the Netmonitor device, enabling them to retrieve sensitive configuration data or potentially manipulate device settings.
Advisories and additional resources, including a proof-of-concept exploit, are documented at Vulncheck (https://www.vulncheck.com/advisories/heatmiser-netmonitor-hardcoded-credentials), Exploit-DB (https://www.exploit-db.com/exploits/47823), the Heatmiser Netmonitor manual (https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf), and an archived Heatmiser site (https://web.archive.org/web/20190724160628/https://www.heatmiser.com/en/). No patches or specific mitigations are outlined in the available description.
Details
- CWE(s)