Filtered by vendor Robotemi
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-16169 | 1 Robotemi | 1 Robox Os | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Authentication Bypass Using an Alternate Path or Channel in temi Robox OS prior to120, temi Android app up to 1.3.7931 allows remote attackers to gain elevated privileges on the temi and have it automatically answer the attacker's calls, granting audio, video, and motor control via unspecified vectors. | |||||
CVE-2020-16167 | 1 Robotemi | 1 Launcher Os | 2024-02-28 | 6.4 MEDIUM | 9.1 CRITICAL |
Missing Authentication for Critical Function in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to receive and answer calls intended for another temi user. Answering the call this way grants motor control of the temi in addition to audio/video via unspecified vectors. | |||||
CVE-2020-16170 | 1 Robotemi | 1 Temi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Use of Hard-coded Credentials in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to listen in on any ongoing calls between temi robots and their users if they can brute-force/guess a six-digit value via unspecified vectors. | |||||
CVE-2020-16168 | 1 Robotemi | 2 Temi, Temi Firmware | 2024-02-28 | 4.3 MEDIUM | 6.5 MEDIUM |
Origin Validation Error in temi Robox OS prior to 120, temi Android app up to 1.3.7931 allows remote attackers to access the REST API and MQTT broker used by the temi and send it custom data/requests via unspecified vectors. |