CVE-2023-5499

Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:reachfargps:reachfar_gps_firmware:28:*:*:*:*:*:*:*
cpe:2.3:h:reachfargps:reachfar_gps:-:*:*:*:*:*:*:*

History

18 Oct 2023, 13:01

Type Values Removed Values Added
CPE cpe:2.3:h:reachfargps:reachfar_gps:-:*:*:*:*:*:*:*
cpe:2.3:o:reachfargps:reachfar_gps_firmware:28:*:*:*:*:*:*:*
References (MISC) https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure - (MISC) https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure - Third Party Advisory
CWE CWE-532
First Time Reachfargps
Reachfargps reachfar Gps
Reachfargps reachfar Gps Firmware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

10 Oct 2023, 14:58

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-10 14:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-5499

Mitre link : CVE-2023-5499

CVE.ORG link : CVE-2023-5499


JSON object : View

Products Affected

reachfargps

  • reachfar_gps_firmware
  • reachfar_gps
CWE
CWE-532

Insertion of Sensitive Information into Log File