Логотип exploitDog
bind:CVE-2023-46892
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-46892

Количество 2

Количество 2

nvd логотип

CVE-2023-46892

около 2 лет назад

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-hf79-3hfm-mgmr

около 2 лет назад

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-46892

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).

CVSS3: 8.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-hf79-3hfm-mgmr

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).

CVSS3: 8.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу