Cyber Posture

CVE-2025-67158

HighPublic PoC

Published: 02 January 2026

Published
02 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0008 24.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67158 is a high-severity Improper Authentication (CWE-287) vulnerability in Revotech I6032W-Fhw Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-287

Detects unauthorized successful logons resulting from improper authentication implementations.

addresses: CWE-287

Documented procedures ensure personnel are trained on authentication mechanisms, tangibly lowering the risk of improper authentication being exploited.

addresses: CWE-287

Security awareness training instructs users on secure authentication practices and avoiding credential compromise.

addresses: CWE-287

Training on authentication mechanisms and best practices decreases the occurrence of improper authentication.

addresses: CWE-287

Non-repudiation requires strong authentication mechanisms to irrefutably attribute performed actions to specific individuals or processes.

addresses: CWE-287

Session content review can reveal authentication bypasses or failures in session establishment.

addresses: CWE-287

Review of authentication-related audit records can detect improper authentication mechanisms or bypasses.

addresses: CWE-287

Assessments check authentication mechanisms for correct implementation and effectiveness, reducing successful authentication bypass attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Auth bypass in public-facing CGI endpoint directly enables remote exploitation for initial access (T1190) and subsequent privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 20210517 allows attackers to access sensitive information and escalate privileges via a crafted HTTP request.

Deeper analysisAI

CVE-2025-67158, published on 2026-01-02, is an authentication bypass vulnerability (CWE-287) affecting the /cgi-bin/jvsweb.cgi endpoint in Revotech I6032W-FHW devices running versions v1.0.0014 through 20210517. Rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), the flaw enables attackers to access sensitive information and escalate privileges by sending a crafted HTTP request.

Unauthenticated attackers with network access to the device can exploit this vulnerability remotely with low attack complexity and no user interaction required. Exploitation results in high-impact confidentiality loss, allowing unauthorized access to sensitive data and subsequent privilege escalation on the targeted system.

Mitigation guidance and additional details are available in the vendor resources at http://revotech.com and the GitHub repository https://github.com/Remenis/CVE-2025-67158.

Details

CWE(s)

Affected Products

revotech
i6032w-fhw firmware
1.0.0014

CVEs Like This One

CVE-2024-57490Shared CWE-287
CVE-2026-33665Shared CWE-287
CVE-2026-0405Shared CWE-287
CVE-2025-56333Shared CWE-287
CVE-2026-33898Shared CWE-287
CVE-2025-60772Shared CWE-287
CVE-2026-22594Shared CWE-287
CVE-2026-5570Shared CWE-287
CVE-2025-52395Shared CWE-287
CVE-2025-15484Shared CWE-287

References