vendor:
Daikin Security Gateway 214
by:
Gjoko 'LiquidWorm' Krstic
8.1
CVSS
CRITICAL
Insecure Direct Object Reference (IDOR)
285
CWE
Product Name: Daikin Security Gateway 214
Affected Version From: App: 100, Frm: 214
Affected Version To: App: 100, Frm: 214
Patch Exists: NO
Related CWE:
CPE: h:daikin_industries:security_gateway_214
Platforms Tested: fasthttp
2025
Daikin Security Gateway 214 – Remote Password Reset
The Daikin Security Gateway 214 is vulnerable to an IDOR flaw in its password reset API endpoint. An attacker can exploit this vulnerability by sending a crafted POST request, bypassing authentication mechanisms. Successful exploitation results in resetting the system credentials to the default Daikin:Daikin username and password combination, granting unauthorized access to the system and potentially compromising connected devices and networks.
Mitigation:
It is recommended to update the Daikin Security Gateway to a patched version that addresses this vulnerability. Additionally, restricting access to the password reset API endpoint and implementing strong authentication mechanisms can help mitigate the risk of exploitation.