


Perceptive Security
SOC/SIEM Consultancy

PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials vulnerability, allowing unauthenticated remote attackers to l…
Published:
19 januari 2026 om 23:00:00
Alert date:
20 januari 2026 om 11:15:47
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT, Database & Storage
CVE-2026-1221 affects the PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS. The vulnerability involves the use of hard-coded credentials stored in the firmware. This allows unauthenticated remote attackers to log in to the database without proper authentication. The vulnerability poses a significant security risk as it provides unauthorized database access. Attackers can exploit this remotely without any authentication requirements. The hard-coded credentials are embedded in the device firmware, making them accessible to attackers who analyze the firmware. This type of vulnerability is particularly serious for network infrastructure devices.
Technical details
Mitigation steps:
Affected products:
BROWAN PrismX MX100 AP controller
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-1221
https://www.twcert.org.tw/en/cp-139-10643-2f8d7-2.html
https://www.twcert.org.tw/tw/cp-132-10642-3b808-1.html
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
