CVE-2025-11500 PUBLISHED

Credentials exposure in tinycontrol devices

Assigner: CERT-PL
Reserved: 08.10.2025 Published: 16.03.2026 Updated: 16.03.2026

Tinycontrol devices such as tcPDU and LAN Controllers LK3.5, LK3.9 and LK4 have two separate authentication mechanisms - one solely for interface management and one for protecting all other server resources. When the latter is turned off (which is a default setting), an unauthenticated attacker on the local network can obtain usernames and encoded passwords for interface management portal by inspecting the HTTP response of the server when visiting the login page, which contains a JSON file with these details. Both normal and admin users credentials are exposed.  This issue has been fixed in firmware versions: 1.36 (for tcPDU), 1.67 (for LK3.5 - hardware versions: 3.5, 3.6, 3.7 and 3.8), 1.75 (for LK3.9 - hardware version 3.9) and 1.38 (for LK4 - hardware version 4.0).

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor tinycontrol
Product Lan Kontroler v3.5
Versions Default: unaffected
  • affected from 0 to 1.67 (excl.)
Vendor tinycontrol
Product LK3.9
Versions Default: unaffected
  • affected from 0 to 1.75 (excl.)
Vendor tinycontrol
Product LK4
Versions Default: unaffected
  • affected from 0 to 1.38 (excl.)
Vendor tinycontrol
Product tcPDU
Versions Default: unaffected
  • affected from 0 to 1.36 (excl.)

Workarounds

Enabling "Basic Authentication" option mitigates the risk, because an attacker has to log in first prior to exploitation.

Credits

  • Paweł Różański (Securitum.com) finder

References

Problem Types

  • CWE-261 Weak Encoding for Password CWE
  • CWE-201 Insertion of Sensitive Information Into Sent Data CWE