[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-40620":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-24T12:20:52.508Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":55,"kevs":69,"epss":9,"epss_history":70,"metrics":71,"affected":83},"CVE-2026-40620","A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor-supplied or compatible client.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-306","Missing Authentication for Critical Function","The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.","weakness","Draft","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-12","Choosing Message Identifier",[],{"id":25,"name":26,"techniques":27},"CAPEC-166","Force the System to Reset Values",[],{"id":29,"name":30,"techniques":31},"CAPEC-216","Communication Channel Manipulation",[],{"id":33,"name":34,"techniques":35},"CAPEC-36","Using Unpublished Interfaces or Functionality",[],{"id":37,"name":38,"techniques":39},"CAPEC-62","Cross Site Request Forgery",[],[],[],[],[],[],[],"2026-04-24T00:02:57.571Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":47},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[56,61,65],{"url":57,"sources":58,"tags":60},"https://senselive.io/contact",[53,59],"nvd",[],{"url":62,"sources":63,"tags":64},"https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12",[53,59],[],{"url":66,"sources":67,"tags":68},"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json",[53,59],[],[],[],[72,79],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":73,"cvss_v4_0":76},{"baseScore":51,"baseSeverity":74,"vectorString":54,"impactScore":51,"exploitabilityScore":75},"CRITICAL",10,{"baseScore":77,"baseSeverity":74,"vectorString":78,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":59,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":80,"cvss_v4_0":81},{"baseScore":51,"baseSeverity":74,"vectorString":54,"impactScore":51,"exploitabilityScore":75},{"baseScore":77,"baseSeverity":74,"vectorString":82,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[84],{"ecosystem":9,"name":85,"vendor":86,"product":87,"cpe_part":88,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":89},"X3050","senselive","x3050","a",[90],{"version":91,"is_range":49,"range_type":53,"version_start":91,"version_start_type":92,"version_end":91,"version_end_type":92,"fixed_in":9},"V1.523","including"]