CVE-2020-9529

Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
References
Link Resource
https://hacked.camera/ Not Applicable
https://redprocyon.com Not Applicable
https://hacked.camera/ Not Applicable
https://redprocyon.com Not Applicable
Configurations

Configuration 1 (hide)

cpe:2.3:o:hichip:shenzhen_hichip_vision_technology_firmware:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:40

Type Values Removed Values Added
References () https://hacked.camera/ - Not Applicable () https://hacked.camera/ - Not Applicable
References () https://redprocyon.com - Not Applicable () https://redprocyon.com - Not Applicable

Information

Published : 2020-08-10 16:15

Updated : 2024-11-21 05:40


NVD link : CVE-2020-9529

Mitre link : CVE-2020-9529

CVE.ORG link : CVE-2020-9529


JSON object : View

Products Affected

hichip

  • shenzhen_hichip_vision_technology_firmware