Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access

Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access

Posted on September 10, 2025September 10, 2025 By CWS

A important safety vulnerability has been found within the Amp’ed RF BT-AP 111 Bluetooth Entry Level, exposing organizations to important safety dangers by way of an unauthenticated administrative interface.

The machine, which serves as a Bluetooth-to-Ethernet bridge supporting each entry level and gateway performance, lacks elementary authentication controls on its web-based administration system.

The vulnerability, designated as CVE-2025-9994, permits distant attackers with community entry to realize full administrative management over the machine with out requiring any credentials.

This flaw impacts the machine’s HTTP-based administrative interface, which manages important features together with Bluetooth configurations, community parameters, and safety settings.

The BT-AP 111 helps Common Plug and Play (UPnP) on the Ethernet facet and may deal with as much as seven simultaneous Bluetooth connections by way of its UART Serial interface.

Carnegie Mellon College analysts recognized this vulnerability by way of CERT Coordination Heart analysis, highlighting the machine’s failure to implement baseline safety controls.

The researchers famous that this configuration violates established NIST safety tips, significantly SP 800-121 Rev. 2, which mandates authentication for Bluetooth gadgets at Service Stage 2 or greater.

Authentication Bypass Mechanism

The vulnerability stems from a whole absence of authentication mechanisms within the machine’s net interface structure.

Not like typical community gadgets that implement login screens or certificate-based authentication, the BT-AP 111 straight exposes its administrative panel to any person accessing its HTTP port.

This design flaw permits attackers to change machine configurations, alter Bluetooth pairing settings, and doubtlessly intercept or manipulate knowledge flowing by way of the bridge.

The exploitation vector requires solely community connectivity to the goal machine, making it accessible to each native community attackers and, in misconfigured environments, distant threats.

Given the seller’s lack of response to disclosure efforts, safety professionals suggest isolating affected gadgets on segregated community segments inaccessible to untrusted customers till correct authentication controls could be carried out.

Increase your SOC and assist your workforce defend your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Access, Admin, Amped, Attackers, Bluetooth, BTAP, Full, Gain, Point, Vulnerability

Post navigation

Previous Post: Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack
Next Post: Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems

Related Posts

U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News
Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign 4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News
Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code Cyber Security News
North Korean Hackers Stealthy Linux Malware Leaked Online North Korean Hackers Stealthy Linux Malware Leaked Online Cyber Security News
Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark