CVE-2025-26793 Scanner

CVE-2025-26793 Scanner - Default Credentials vulnerability in FREEDOM Administration

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 week 4 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

FREEDOM Administration is a web-based management system used for controlling access and security configurations in residential and commercial buildings. It is commonly deployed in apartment complexes, office buildings, and gated communities. The software allows administrators to manage user access permissions, monitor security logs, and configure connected security hardware. FREEDOM Administration is used in Canada and the United States to regulate building access and protect resident information. The platform is designed for integration with existing security infrastructures, making it a critical component in property management. Due to its extensive use in physical security, any vulnerability in this system can have severe consequences.

This vulnerability affects the FREEDOM Administration system and allows attackers to gain unauthorized administrative access using default credentials. The web GUI configuration panel ships with preset login credentials that are not required to be changed upon initial setup. This oversight results in easily exploitable systems if administrators fail to update the credentials manually. The issue is categorized under CWE-521 (Weak Password Requirements) and allows attackers to control security settings. Exploiting this vulnerability could lead to unauthorized access to security logs, entry controls, and resident information. The widespread use of these systems in apartment buildings increases the risk of exploitation.

The vulnerability is caused by the system’s reliance on hardcoded default credentials. The login credentials (username: "freedom", password: "viscount") are set by default and are not required to be changed upon deployment. Attackers can send a crafted HTTP POST request to the "/mesh/servlet/mesh.webadmin.MESHAdminServlet" endpoint using these credentials to gain administrative access. The server processes the request and grants full access to the control panel if the credentials are correct. Since this authentication flaw does not enforce credential changes, many deployments remain vulnerable. This issue enables attackers to remotely access and manipulate security settings without prior authorization.

Exploitation of this vulnerability allows attackers to control building access systems without authentication. Unauthorized users can modify security configurations, disable surveillance features, or generate new access credentials. Attackers may also extract personally identifiable information (PII) of building residents, leading to potential identity theft or social engineering attacks. The ability to remotely control entry systems poses a severe security risk to residents and property managers. In extreme cases, this flaw could be used to gain unauthorized physical access to apartment buildings and office complexes. Organizations relying on this system must immediately secure their deployments to prevent unauthorized intrusions.

REFERENCES

Get started to protecting your Free Full Security Scan