Vulnerability Description
A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pihome | Maxair | 2.0 |
Related Weaknesses (CWE)
References
- https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-acExploitMitigationThird Party Advisory
- https://vuldb.com/?ctiid.295173Permissions RequiredVDB Entry
- https://vuldb.com/?id.295173Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.497533Third Party AdvisoryVDB Entry
- https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-acExploitMitigationThird Party Advisory
FAQ
What is CVE-2025-1214?
CVE-2025-1214 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipula...
How severe is CVE-2025-1214?
CVE-2025-1214 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-1214?
Check the references section above for vendor advisories and patch information. Affected products include: Pihome Maxair.