Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.
References
Link | Resource |
---|---|
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md | Third Party Advisory |
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-10 16:15
Updated : 2023-05-17 20:36
NVD link : CVE-2023-30351
Mitre link : CVE-2023-30351
CVE.ORG link : CVE-2023-30351
JSON object : View
Products Affected
tenda
- cp3_firmware
- cp3
CWE
CWE-326
Inadequate Encryption Strength