4 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Hardcoded admin token in SoundBar apps in Linkplay SDK 1.00 allows remote attackers to gain admin privilege access in linkplay antifactory El token de administrador codificado en las aplicaciones de SoundBar en Linkplay SDK 1.00 permite a los atacantes remotos obtener acceso con privilegios de administrador en linkplay antifactory • https://gist.github.com/zachi40/1f8d174939684c07f5e32ee039ce9acf • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet. Se detectó un problema en los dispositivos Zolo Halo por medio del firmware Linkplay. • https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution https://labs.mwrinfosecurity.com/advisories https://linkplay.com/featured-products •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 1

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities. Se detectó un problema en los dispositivos Zolo Halo por medio del firmware Linkplay. • https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution https://labs.mwrinfosecurity.com/advisories https://linkplay.com/featured-products • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 1

An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled. • https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution https://labs.mwrinfosecurity.com/advisories https://linkplay.com/featured-products • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-639: Authorization Bypass Through User-Controlled Key •