CVE-2026-2330
CROWN · REST interface
The CROWN REST interface fails to enforce whitelists on internal testing directories. Unauthenticated attackers can upload manipulated parameter files to modify critical device settings.
Executive summary
Incomplete whitelist enforcement in the CROWN REST interface allows unauthenticated attackers to modify critical device settings and network configurations.
Vulnerability
Certain internal testing directories were omitted from the CROWN REST interface's security whitelist. This allows an unauthenticated attacker to access these directories and upload manipulated parameter files. These files become active after a system reboot, allowing the attacker to change network configurations and application parameters.
Business impact
An attacker could use this flaw to permanently alter the behavior of the device, potentially locking out legitimate administrators or diverting data to attacker-controlled servers. This leads to long-term persistence and significant operational disruption. The CVSS score of 9.4 reflects the high impact on integrity and availability.
Remediation
Immediate Action: Update the CROWN software to the latest version to ensure all REST endpoints are properly covered by the security whitelist.
Proactive Monitoring: Monitor for unauthorized file uploads to the REST interface and audit device configuration changes after every reboot.
Compensating Controls: Implement strict network access control lists (ACLs) to ensure only authorized workstations can communicate with the CROWN REST interface.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Bypassing whitelists in management interfaces is a critical risk. Organizations must ensure that all testing and debugging interfaces are either removed from production builds or strictly authenticated. Apply the vendor's patch immediately to close this unauthorized access path.