CVE-2025-59100

N/A Unknown
Published: January 26, 2026 Modified: January 26, 2026
View on NVD

Description

The web interface offers a functionality to export the internal SQLite database. After executing the database export, an automatic download is started and the device reboots. After rebooting, the exported database is deleted and cannot be accessed anymore. However, it was noticed that sometimes the device does not reboot and therefore the exported database is not deleted, or the device reboots and the export is not deleted for unknown reasons. The path where the database export is located can be accessed without prior authentication. This leads to the fact that an attacker might be able to get access to the exported database without prior authentication. The database includes sensitive data like passwords, card pins, encrypted Mifare sitekeys and much more.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://r.sec-consult.com/dkaccess
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://r.sec-consult.com/dormakaba
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf
https://www.dormakabagroup.com/en/security-advisories
Source: 551230f0-3615-47bd-b7cc-93e92e730bbf

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
10th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)