Daikin Disaster: Security Gateway Password Reset Vulnerability Exposed!
The Daikin Security Gateway 214 has a vulnerability that allows remote password reset. An unauthenticated attacker can exploit an IDOR flaw, resetting system credentials back to the default Daikin:Daikin combo. This opens the gateway to unauthorized access and potential compromise of connected devices.

Hot Take:
Daikin’s security gateway is making quite a splash by resetting passwords faster than you can say “unauthenticated access.” If only forgetting your ex was this easy!
Key Points:
- Daikin’s Security Gateway has a vulnerability that allows remote password resets.
- The flaw is due to an Insecure Direct Object Reference (IDOR) in the password reset API endpoint.
- Unauthorized users can reset the system credentials to default values without prior access.
- Exploiting this flaw could compromise connected devices and networks.
- The vulnerability was discovered by Gjoko ‘LiquidWorm’ Krstic and is documented in advisory ZSL-2025-5931.
Already a member? Log in here