An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/Jul/14 | |
https://www.eurofins-cybersecurity.com/news/connected-devices-baby-monitors-part-2/ | Exploit Third Party Advisory |
https://www.sannce.com | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
30 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-07-22 13:15
Updated : 2024-07-30 01:15
NVD link : CVE-2019-20467
Mitre link : CVE-2019-20467
CVE.ORG link : CVE-2019-20467
JSON object : View
Products Affected
sannce
- smart_hd_wifi_security_camera_ean_2_950004_595317_firmware
- smart_hd_wifi_security_camera_ean_2_950004_595317
CWE