🔐 CVE Alert

CVE-2026-27843

CRITICAL 9.1

SenseLive X3050 Missing authentication for critical function

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recovery mechanisms and network settings, an attacker can induce a persistent lockout state. Because the device lacks a physical reset button, recovery requires specialized technical access via the console to perform a factory reset, resulting in a total denial-of-service for the gateway and its connected RS-485 downstream systems.

CWE CWE-306
Vendor senselive
Product x3050
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for senselive x3050

Be the first to know when new critical vulnerabilities affecting senselive x3050 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

SenseLive / X3050
V1.523

References

NVD ↗ CVE.org ↗ EPSS Data ↗
senselive.io: https://senselive.io/contact cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12 github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json

Credits

Jithin Nambiar J reported these vulnerabilities to CISA.