CVE-2014-7279

The Konke Smart Plug K does not require authentication for TELNET sessions, which allows remote attackers to obtain "equipment management authority" via TCP traffic to port 23.
References
Link Resource
http://www.exploit-db.com/exploits/35103 Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/35103 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:kankunit:konke_smart_plug_firmware:k:*:*:*:*:*:*:*
cpe:2.3:h:kankunit:konke_smart_plug:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:16

Type Values Removed Values Added
References () http://www.exploit-db.com/exploits/35103 - Exploit, Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/35103 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-03-23 17:59

Updated : 2024-11-21 02:16


NVD link : CVE-2014-7279

Mitre link : CVE-2014-7279

CVE.ORG link : CVE-2014-7279


JSON object : View

Products Affected

kankunit

  • konke_smart_plug_firmware
  • konke_smart_plug
CWE
CWE-264

Permissions, Privileges, and Access Controls