CVE-2019-20466

An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. A local attacker with the "default" account is capable of reading the /etc/passwd file, which contains a weakly hashed root password. By taking this hash and cracking it, the attacker can obtain root rights on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sannce:smart_hd_wifi_security_camera_ean_2_950004_595317_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sannce:smart_hd_wifi_security_camera_ean_2_950004_595317:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:38

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Jul/14 - () http://seclists.org/fulldisclosure/2024/Jul/14 -
References () https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ - Exploit, Third Party Advisory () https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ - Exploit, Third Party Advisory

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/14 -

Information

Published : 2021-04-02 16:15

Updated : 2024-11-21 04:38


NVD link : CVE-2019-20466

Mitre link : CVE-2019-20466

CVE.ORG link : CVE-2019-20466


JSON object : View

Products Affected

sannce

  • smart_hd_wifi_security_camera_ean_2_950004_595317
  • smart_hd_wifi_security_camera_ean_2_950004_595317_firmware
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort