Описание
DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3.4 (исключая)
Одновременно
cpe:2.3:o:dten:d5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dten:d5:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 1.3.4 (исключая)
Одновременно
cpe:2.3:o:dten:d7_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dten:d7:-:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00857
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
github
больше 3 лет назад
DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
EPSS
Процентиль: 75%
0.00857
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo