CVE-2026-1633
Synectix · LAN 232 TRIO
The Synectix LAN 232 TRIO serial to ethernet adapter exposes its web management interface without authentication, allowing unauthenticated users to modify settings or factory reset the device.
Executive summary
Synectix LAN 232 TRIO adapters possess a critical security flaw where the web management interface is completely unprotected, allowing unauthenticated remote attackers to disrupt serial communications.
Vulnerability
The device exposes its web-based configuration dashboard without requiring any credentials. This allows an unauthenticated attacker to change critical device settings, network configurations, or trigger a factory reset.
Business impact
With a CVSS score of 10.0, the impact is catastrophic for industrial or commercial environments relying on serial-to-ethernet connectivity. An attacker can disconnect critical serial hardware, redirect data streams, or render the adapter inoperable. This leads to immediate operational downtime and potential loss of control over connected legacy equipment.
Remediation
Immediate Action: Update the device firmware to the latest version and immediately restrict network access to the management interface.
Proactive Monitoring: Audit network traffic for any unauthorized HTTP/HTTPS requests directed at the adapter’s IP address.
Compensating Controls: Place the serial adapters on a dedicated, isolated management VLAN and use a firewall to permit access only from trusted administrative IPs.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The Synectix LAN 232 TRIO must be secured immediately through network isolation and firmware updates. Because these devices often sit at the junction of IT and OT networks, the risk of lateral movement or process disruption is extremely high.