Lierda Grill Temperature Monitor V1.00_50006 has a default password of admin for the admin account, which allows an attacker to cause a Denial of Service or Information Disclosure via the undocumented access-point configuration page located on the device. This wifi thermometer app requests and requires excessive permissions to operate such as Fine GPS location, camera, applists, Serial number, IMEI. In addition to the "backdoor" login access for "admin" purposes, this accompanying app also establishes connections with several china based URLs to include Alibaba cloud computing. NOTE: this device also ships with ProGrade branding.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154221/ProGrade-Lierda-Grill-Temperature-1.00_50006-Hardcoded-Credentials.html | Third Party Advisory VDB Entry |
http://progradegrill.com/wifi-grilling-thermometer/ | Product |
http://seclists.org/fulldisclosure/2019/Aug/24 | Mailing List Third Party Advisory |
https://www.joesandbox.com/analysis/287596/0/html |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-08-26 13:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-15304
Mitre link : CVE-2019-15304
CVE.ORG link : CVE-2019-15304
JSON object : View
Products Affected
progradegrill
- wifi_grilling_thermometer_firmware
- wifi_grilling_thermometer
CWE
CWE-1188
Insecure Default Initialization of Resource