CVE-2026-31846

Published: Mar 23, 2026 Last Modified: Mar 23, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,1
Source: 309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
Attack Vector: adjacent
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM 6,5
Source: 309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
MEDIUM 6,1
Source: 309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c
Access Vector: adjacent_network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: none
Availability: none

Description

AI Translation Available

An unauthenticated credential disclosure vulnerability in the /goform/ate endpoint of Nexxt Solutions Nebula 300+ firmware through Nebula300+_v12.01.01.37 allows an adjacent attacker to obtain the administrator password in Base64-encoded form via a crafted HTTP request. The recovered credential can be used to authenticate to the device and facilitates further compromise when combined with other weaknesses present in the firmware.

306

Missing Authentication for Critical Function

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Gain Privileges Or Assume Identity Varies By Context
Applicable Platforms
Technologies: Cloud Computing, ICS/OT
View CWE Details
https://nexxt-connectivity-frontend.s3.amazonaws.com/media/docs/Nebula300+_v12.…
https://www.nexxtsolutions.com/connectivity/internal-products/ARN02304U6/