Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x7cq-cqf3-v9jr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.

EPSS

Процентиль: 75%
0.00857
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.

EPSS

Процентиль: 75%
0.00857
Низкий