๐Ÿ” CVE Alert

CVE-2023-54327

CRITICAL 9.8

Tinycontrol LAN Controller 1.58a Authentication Bypass via Admin Password Change

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

Tinycontrol LAN Controller 1.58a contains an authentication bypass vulnerability that allows unauthenticated attackers to change admin passwords through a crafted API request. Attackers can exploit the /stm.cgi endpoint with a specially crafted authentication parameter to disable access controls and modify administrative credentials.

CWE CWE-862
Vendor tinycontrol
Product lan controller
Published Dec 30, 2025
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for tinycontrol lan controller

Be the first to know when new critical vulnerabilities affecting tinycontrol lan controller are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Tinycontrol / LAN Controller
HW 3.8 Unknown โ‰ค 1.58a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/51732 tinycontrol.pl: https://www.tinycontrol.pl zeroscience.mk: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5787.php vulncheck.com: https://www.vulncheck.com/advisories/tinycontrol-lan-controller-a-authentication-bypass-via-admin-password-change

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab