Описание
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:flient:smart_lock_advanced:-:*:*:*:*:*:*:*
EPSS
Процентиль: 26%
0.00092
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-798
CWE-798
Связанные уязвимости
CVSS3: 6.8
github
около 2 лет назад
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
EPSS
Процентиль: 26%
0.00092
Низкий
6.8 Medium
CVSS3
Дефекты
CWE-798
CWE-798