7 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component. Un problema en Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 permite a un atacante local obtener información confidencial a través del componente de contraseña. • https://github.com/minj-ae/CVE-2024-24488 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md • CWE-326: Inadequate Encryption Strength •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_uRCE.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RTSPa.md • CWE-798: Use of Hard-coded Credentials •