Súbít #713990: joey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authenticationbayani

Kurajoey-zhou xiaozhi-esp32-server-java V3.0.0 Improper Authentication
GaskiyaXiaozhi ESP32 Server Java V3.0.0 (the latest version) contains an authentication bypass vulnerability. Attackers can exploit the access whitelist set by the developer to obtain sensitive user information and forge cookies to impersonate any user login. Project address:https://github.com/joey-zhou/xiaozhi-esp32-server-java Scope of impact: Several companies have been found to have deployed this service. The ICO can be used as a fingerprint for searching.
Manga⚠️ https://github.com/joey-zhou/xiaozhi-esp32-server-java/issues/143
Màdùmga
 zzdzz (UID 93061)
Furta12/12/2025 08:24 (2 Wurɗi 전)
Gargajiya12/27/2025 10:53 (15 days later)
HalittaShingilam
VulDB gite338513 [joey-zhou xiaozhi-esp32-server-java har 3.0.0 Cookie AuthenticationInterceptor.java tryAuthenticateWithCookies karkar ndiyamga taƙa]
Nganji20

Do you want to use VulDB in your project?

Use the official API to access entries easily!