The bugs allow infiltration of the devices' management system and access without authorisation.
Users of SinoTrack GPS trackers have been warned by the CISA regarding high-severity vulnerabilities which could be exploited to facilitate remote compromise.
Within the SinoTrack IoT PC Platform, one of the flaws - CVE-2025-5484 - enables easy infiltration of the devices' management system via widely known default credentials.
The other is an observable response bug, tracked as CVE-2025-5485, stems from the insecure structuring of usernames that are up to 10 digits long.
With SinoTrack yet to provide patches for the security defects, all SinoTrack GPS device users have been urged to implement more robust passwords through the management interface, as well as conceal the device identifiers that could be leveraged by threat actors.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.