Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
GPS Tracking System 2.12: Unauthenticated Access via Username Input
CVE-2018-25192
Summary
Attackers can bypass login security by injecting malicious code into the username field, potentially gaining unauthorized access to the system. This can happen when an attacker submits a specially crafted username in a login attempt. To protect your system, update to the latest version of GPS Tracking System or implement input validation to prevent SQL injection attacks.
Original title
GPS Tracking System 2.12 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can s...
Original description
GPS Tracking System 2.12 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit crafted POST requests to the login.php endpoint with SQL injection payloads in the username field to gain unauthorized access without valid credentials.
nvd CVSS3.1
8.2
nvd CVSS4.0
8.8
Vulnerability type
CWE-89
SQL Injection
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026