Daikin Disaster: Security Gateway Password Reset Vulnerability Exposed!

The Daikin Security Gateway 214 has a vulnerability that allows remote password reset. An unauthenticated attacker can exploit an IDOR flaw, resetting system credentials back to the default Daikin:Daikin combo. This opens the gateway to unauthorized access and potential compromise of connected devices.

Pro Dashboard

Hot Take:

Daikin’s security gateway is making quite a splash by resetting passwords faster than you can say “unauthenticated access.” If only forgetting your ex was this easy!

Key Points:

  • Daikin’s Security Gateway has a vulnerability that allows remote password resets.
  • The flaw is due to an Insecure Direct Object Reference (IDOR) in the password reset API endpoint.
  • Unauthorized users can reset the system credentials to default values without prior access.
  • Exploiting this flaw could compromise connected devices and networks.
  • The vulnerability was discovered by Gjoko ‘LiquidWorm’ Krstic and is documented in advisory ZSL-2025-5931.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?