Vulnerabilities (CVE)

Filtered by vendor Chcnav Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30627 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 5.7 MEDIUM
This vulnerability affects all of the company's products that also include the FW versions: update_i90_cv2.021_b20210104, update_i50_v1.0.55_b20200509, update_x6_v2.1.2_b202001127, update_b5_v2.0.9_b20200706. This vulnerability makes it possible to extract from the FW the existing user passwords on their operating systems and passwords.
CVE-2022-30626 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 6.3 MEDIUM
Browsing the path: http://ip/wifi_ap_pata_get.cmd, will show in the name of the existing access point on the component, and a password in clear text.
CVE-2022-30625 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 5.7 MEDIUM
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. A directory listing provides an attacker with the complete index of all the resources located inside of the directory. The specific risks and consequences vary depending on which files are listed and accessible.
CVE-2022-30624 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 6.8 MEDIUM
Browsing the admin.html page allows the user to reset the admin password. Also appears in the JS code for the password.
CVE-2022-30623 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 5.9 MEDIUM
The server checks the user's cookie in a non-standard way, and a value is entered in the cookie value name of the status and its value is set to true to bypass the identification with the system using a username and password.
CVE-2022-30622 1 Chcnav 2 P5e Gnss, P5e Gnss Firmware 2024-11-21 N/A 5.3 MEDIUM
Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword.