Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
References
Link | Resource |
---|---|
http://oclean.com | Product |
https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign | Product |
http://oclean.com | Product |
https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign | Product |
Configurations
History
21 Nov 2024, 05:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://oclean.com - Product | |
References | () https://github.com/c3r34lk1ll3r/decrypt-oclean-traffic - Exploit, Third Party Advisory | |
References | () https://play.google.com/store/apps/details?id=com.yunding.noopsychebrushforeign - Product |
Information
Published : 2021-02-11 18:15
Updated : 2024-11-21 05:18
NVD link : CVE-2020-25493
Mitre link : CVE-2020-25493
CVE.ORG link : CVE-2020-25493
JSON object : View
Products Affected
oclean
- oclean