The dbell Wi-Fi Smart Video Doorbell DB01-S Gen 1 allows remote attackers to launch commands with no authentication verification via TCP port 81, because the loginuse and loginpass parameters to openlock.cgi can have arbitrary values. NOTE: the vendor's position is that this product reached end of life in 2016.
References
Link | Resource |
---|---|
http://noahclements.com/Improper-Input-Validation-on-dbell-Smart-Doorbell-Can-Lead-To-Attackers-Remotely-Unlocking-Door/ | Exploit Third Party Advisory |
https://www.reddit.com/r/AskNetsec/comments/c9p22m/company_threatening_to_sue_me_if_i_publicly/ | Issue Tracking Third Party Advisory |
https://www.youtube.com/watch?v=SkTKt1nV57I | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-10-08 13:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-13336
Mitre link : CVE-2019-13336
CVE.ORG link : CVE-2019-13336
JSON object : View
Products Affected
dbell
- db01-s_firmware
- db01-s
CWE
CWE-287
Improper Authentication