← Back to CVEs
CVE-2026-2330
CRITICAL9.4
Description
An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters.
CVE Details
CVSS v3.1 Score9.4
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/6/2026
Last Modified3/9/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-552
References
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.