Логотип exploitDog
bind:CVE-2019-9659
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9659

Количество 2

Количество 2

nvd логотип

CVE-2019-9659

почти 7 лет назад

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-9c2v-c4r3-gwmm

больше 3 лет назад

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-9659

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

CVSS3: 9.1
0%
Низкий
почти 7 лет назад
github логотип
GHSA-9c2v-c4r3-gwmm

The Chuango 433 MHz burglar-alarm product line uses static codes in the RF remote control, allowing an attacker to arm, disarm, or trigger the alarm remotely via replay attacks, as demonstrated by Chuango branded products, and non-Chuango branded products such as the Eminent EM8617 OV2 Wifi Alarm System.

CVSS3: 9.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу