Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access

Posted on September 10, 2025September 10, 2025 By CWS

A important safety vulnerability has been found within the Amp’ed RF BT-AP 111 Bluetooth Entry Level, exposing organizations to important safety dangers by way of an unauthenticated administrative interface.

The machine, which serves as a Bluetooth-to-Ethernet bridge supporting each entry level and gateway performance, lacks elementary authentication controls on its web-based administration system.

The vulnerability, designated as CVE-2025-9994, permits distant attackers with community entry to realize full administrative management over the machine with out requiring any credentials.

This flaw impacts the machine’s HTTP-based administrative interface, which manages important features together with Bluetooth configurations, community parameters, and safety settings.

The BT-AP 111 helps Common Plug and Play (UPnP) on the Ethernet facet and may deal with as much as seven simultaneous Bluetooth connections by way of its UART Serial interface.

Carnegie Mellon College analysts recognized this vulnerability by way of CERT Coordination Heart analysis, highlighting the machine’s failure to implement baseline safety controls.

The researchers famous that this configuration violates established NIST safety tips, significantly SP 800-121 Rev. 2, which mandates authentication for Bluetooth gadgets at Service Stage 2 or greater.

Authentication Bypass Mechanism

The vulnerability stems from a whole absence of authentication mechanisms within the machine’s net interface structure.

Not like typical community gadgets that implement login screens or certificate-based authentication, the BT-AP 111 straight exposes its administrative panel to any person accessing its HTTP port.

This design flaw permits attackers to change machine configurations, alter Bluetooth pairing settings, and doubtlessly intercept or manipulate knowledge flowing by way of the bridge.

The exploitation vector requires solely community connectivity to the goal machine, making it accessible to each native community attackers and, in misconfigured environments, distant threats.

Given the seller’s lack of response to disclosure efforts, safety professionals suggest isolating affected gadgets on segregated community segments inaccessible to untrusted customers till correct authentication controls could be carried out.

Increase your SOC and assist your workforce defend your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Access, Admin, Amped, Attackers, Bluetooth, BTAP, Full, Gain, Point, Vulnerability

Post navigation

Previous Post: Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack
Next Post: Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems

Related Posts

Penetration Testing in the AI Era Tools and Techniques Cyber Security News
Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine Cyber Security News
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Multi-Factor Authentication for Online Services
  • Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine
  • Jaguar Land Rover Confirms Hackers Stole Data in Ongoing Cyberattack
  • CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions
  • AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Multi-Factor Authentication for Online Services
  • Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine
  • Jaguar Land Rover Confirms Hackers Stole Data in Ongoing Cyberattack
  • CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions
  • AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News