CVE-2025-54756 - Vulnerability Analysis
HighCVSS: 8.4Last Updated: February 13, 2026
BrightSign BrightSign OS - Authentication Bypass
Overview
BrightSign BrightSign OS series 4 < 8.5.53.1 and series 5 < 9.0.166 contain a broken authentication caused by use of guessable default passwords, letting attackers gain unauthorized access, exploit requires knowledge of device information.
Severity & Score
Impact
Attackers can gain unauthorized access by guessing default passwords, potentially leading to full system compromise.
Mitigation
Update to BrightSign OS series 4 version 8.5.53.1 or series 5 version 9.0.166 or later.
References
Social Media Activity(1 post)
š CVE-2025-54756 - High (8.4) BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. The latest release fixes this issue for new installations; use... š https://www.thehackerwire.com/vulnerability/CVE-2025-54756/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-54756
- Severity
- High
- CVSS Score
- 8.4
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 1.2%
- Social Posts
- 1
CWE
- CWE-1392
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H