DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
References
Link | Resource |
---|---|
https://www.forescout.com/company/blog/dten-vulnerability/ | Third Party Advisory |
https://www.forescout.com/company/blog/dten-vulnerability/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.forescout.com/company/blog/dten-vulnerability/ - Third Party Advisory |
Information
Published : 2020-01-06 20:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16273
Mitre link : CVE-2019-16273
CVE.ORG link : CVE-2019-16273
JSON object : View
Products Affected
dten
- d7
- d5_firmware
- d5
- d7_firmware
CWE