🔐 CVE Alert

CVE-2026-40623

HIGH 8.1

SenseLive X3050 Missing Authorization

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in SenseLive X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls. Due to inadequate enforcement of constraints on sensitive functions, parameters such as IP addressing, watchdog timers, reconnect intervals, and service ports can be set to unsupported or unsafe values. These configuration changes directly affect core device behaviour and recovery mechanisms. The lack of proper validation and safeguards allows critical system functions to be altered in a manner that can destabilize device operation or render the device persistently unavailable.

CWE CWE-862
Vendor senselive
Product x3050
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for senselive x3050

Be the first to know when new high vulnerabilities affecting senselive x3050 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

SenseLive / X3050
V1.523

References

NVD ↗ CVE.org ↗ EPSS Data ↗
senselive.io: https://senselive.io/contact cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12 github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json

Credits

Jithin Nambiar J reported these vulnerabilities to CISA.