
CVE-2023-30351
https://notcve.org/view.php?id=CVE-2023-30351
10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md • CWE-326: Inadequate Encryption Strength CWE-798: Use of Hard-coded Credentials •

CVE-2023-30352
https://notcve.org/view.php?id=CVE-2023-30352
10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RTSPa.md • CWE-798: Use of Hard-coded Credentials •

CVE-2023-30353
https://notcve.org/view.php?id=CVE-2023-30353
10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_uRCE.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2023-30354
https://notcve.org/view.php?id=CVE-2023-30354
10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_NCD.md • CWE-319: Cleartext Transmission of Sensitive Information CWE-798: Use of Hard-coded Credentials •

CVE-2023-30356
https://notcve.org/view.php?id=CVE-2023-30356
10 May 2023 — Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md • CWE-354: Improper Validation of Integrity Check Value •

CVE-2023-23080
https://notcve.org/view.php?id=CVE-2023-23080
27 Feb 2023 — Certain Tenda products are vulnerable to command injection. This affects Tenda CP7 Tenda CP7<=V11.10.00.2211041403 and Tenda CP3 v.10 Tenda CP3 v.10<=V20220906024_2025 and Tenda IT7-PCS Tenda IT7-PCS<=V2209020914 and Tenda IT7-LCS Tenda IT7-LCS<=V2209020914 and Tenda IT7-PRS Tenda IT7-PRS<=V2209020908. • https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •