ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices.
References
Link | Resource |
---|---|
https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/ | Exploit Technical Description Third Party Advisory |
https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/ | Exploit Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 07:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/ - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2022-09-26 11:15
Updated : 2024-11-21 07:17
NVD link : CVE-2022-38970
Mitre link : CVE-2022-38970
CVE.ORG link : CVE-2022-38970
JSON object : View
Products Affected
hipcam
- realserver
iegeek
- ig20_firmware
- ig20
CWE
CWE-330
Use of Insufficiently Random Values