Описание
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
Ссылки
- Product
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Product
- Product
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:blackvue:dr750-2ch_lte_firmware:1.012_2022.10.26:*:*:*:*:*:*:*
cpe:2.3:h:blackvue:dr750-2ch_lte:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:blackvue:dr750-2ch_ir_lte_firmware:1.012_2022.10.26:*:*:*:*:*:*:*
cpe:2.3:h:blackvue:dr750-2ch_ir_lte:-:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.04208
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-307
CWE-307
Связанные уязвимости
CVSS3: 9.8
github
почти 3 года назад
BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
EPSS
Процентиль: 88%
0.04208
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-307
CWE-307