CVE-2019-16273

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dten:d5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dten:d5:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:dten:d7_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dten:d7:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:30

Type Values Removed Values Added
References () https://www.forescout.com/company/blog/dten-vulnerability/ - Third Party Advisory () https://www.forescout.com/company/blog/dten-vulnerability/ - Third Party Advisory

Information

Published : 2020-01-06 20:15

Updated : 2024-11-21 04:30


NVD link : CVE-2019-16273

Mitre link : CVE-2019-16273

CVE.ORG link : CVE-2019-16273


JSON object : View

Products Affected

dten

  • d7
  • d5_firmware
  • d5
  • d7_firmware