CVE-2018-4018
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version RoavA1SWV1.9. The HTTP server allows for arbitrary firmware binaries to be uploaded which will be flashed upon next reboot. An attacker can send an HTTP PUT request or upgrade firmware request to trigger this vulnerability.
Se presenta una vulnerabilidad explotable de actualización de firmware en NT9665X Chipset firmware ejecutado en Anker Roav A1 Dashcam, versión RoavA1SWV1.9. El servidor HTTP permite que binarios de firmware arbitrarios sean cargados que serán actualizados en el próximo reinicio. Un atacante puede enviar una petición HTTP PUT o actualizar una petición de firmware para activar esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-01-02 CVE Reserved
- 2019-05-13 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0689 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Anker-in Search vendor "Anker-in" | Roav Dashcam A1 Firmware Search vendor "Anker-in" for product "Roav Dashcam A1 Firmware" | 1.9 Search vendor "Anker-in" for product "Roav Dashcam A1 Firmware" and version "1.9" | - |
Affected
| in | Anker-in Search vendor "Anker-in" | Roav Dashcam A1 Search vendor "Anker-in" for product "Roav Dashcam A1" | - | - |
Safe
|