Red Lion DA50N
Red Lion DA50N contains multiple vulnerabilities (CWE-345, CWE-521, CWE-1104) involving weak authentication, insecure credential storage, and related authentication bypass issues. The device allows installation of unsigned firmware images, weak default passwords (admin, rlcuser, techsup accounts), and optional services (SSH, telnet) that can be left enabled. Red Lion has marked the DA50N series as end-of-life and does not intend to release patches. Successful exploitation could result in data compromise, modification, and denial of service.
- Network access to the DA50N device
- Knowledge of default account names (admin, rlcuser, techsup)
- Physical access to SD card slot (for firmware insertion attack)
- Ability to intercept or redirect firmware downloads over the network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5affbe3e-52ce-4bd0-adbd-d6b31450edcdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.