An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Jul/14 | |
https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ | Exploit Third Party Advisory |
https://www.sannce.com | Vendor Advisory |
http://seclists.org/fulldisclosure/2024/Jul/14 | |
https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ | Exploit Third Party Advisory |
https://www.sannce.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jul/14 - | |
References | () https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ - Exploit, Third Party Advisory | |
References | () https://www.sannce.com - Vendor Advisory |
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-07-22 13:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20467
Mitre link : CVE-2019-20467
CVE.ORG link : CVE-2019-20467
JSON object : View
Products Affected
sannce
- smart_hd_wifi_security_camera_ean_2_950004_595317
- smart_hd_wifi_security_camera_ean_2_950004_595317_firmware
CWE