CVE-2020-21995

Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inim:smartliving_505_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_505:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inim:smartliving_515_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_515:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:inim:smartliving_1050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_1050:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:inim:smartliving_1050g3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_1050g3:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:inim:smartliving_10100l_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_10100l:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:inim:smartliving_10100lg3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inim:smartliving_10100lg3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:12

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/47763 - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/47763 - Third Party Advisory, VDB Entry
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php - Third Party Advisory () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.php - Third Party Advisory

Information

Published : 2021-04-29 15:15

Updated : 2024-11-21 05:12


NVD link : CVE-2020-21995

Mitre link : CVE-2020-21995

CVE.ORG link : CVE-2020-21995


JSON object : View

Products Affected

inim

  • smartliving_1050g3
  • smartliving_515
  • smartliving_10100l_firmware
  • smartliving_10100l
  • smartliving_10100lg3_firmware
  • smartliving_505_firmware
  • smartliving_505
  • smartliving_1050g3_firmware
  • smartliving_10100lg3
  • smartliving_1050
  • smartliving_1050_firmware
  • smartliving_515_firmware
CWE
CWE-798

Use of Hard-coded Credentials