Cyber Posture

CVE-2022-50803

CriticalPublic PoC

Published: 30 December 2025

Published
30 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

JM-DATA ONU JF511-TV version 1.0.67 uses default credentials that allow attackers to gain unauthorized access to the device with administrative privileges.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires changing default authenticators prior to first use, preventing unauthorized administrative access via known credentials.

prevent

Mandates management of accounts including creation, modification, and disabling of unnecessary or default accounts to block unauthorized access.

prevent

Enforces secure configuration settings that include non-default credentials and restrictive access configurations for the device.

Security SummaryAI

CVE-2022-50803 is a critical vulnerability in the JM-DATA ONU JF511-TV version 1.0.67, where the device uses default credentials that permit unauthorized access with administrative privileges. This issue, classified under CWE-1392, carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and potential for complete compromise of confidentiality, integrity, and availability.

Remote attackers require no privileges, user interaction, or special conditions to exploit this flaw by simply authenticating with the default credentials. Upon success, they obtain full administrative control over the ONU device, enabling arbitrary actions such as configuration changes, data extraction, or disruption of network services.

Advisories on this vulnerability are published by CXSecurity (WLB-2022060058), IBM X-Force Exchange, Packet Storm Security, and VulnCheck, with the manufacturer's site at https://www.jm-data.com/. Security practitioners should review these references for guidance on mitigations, such as changing default credentials or applying any available firmware updates.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability involves default credentials enabling unauthorized administrative access, directly mapping to T1078.001: Default Accounts.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References