Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.php
https://www.vulncheck.com/advisories/thrive-smart-home-smart-home-improper-limitation-o
https://www.exploit-db.com/exploits/47814
https://packetstorm.news/files/id/155797
Published: 2026-02-12
Updated: 2026-02-13
Base Score: 8.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:P/A:N
Severity: High
Base Score: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Severity: High
Base Score: 8.8
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00195