An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. It uses a default SSID value, which makes it easier for remote attackers to discover the physical locations of many Siime Eye devices, violating the privacy of users who do not wish to disclose their ownership of this type of device. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.)
References
Link | Resource |
---|---|
https://seclists.org/fulldisclosure/2024/Jul/14 | Mailing List Third Party Advisory Exploit |
Configurations
Configuration 1 (hide)
AND |
|
History
24 Apr 2025, 13:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Svakom svakom Siime Eye
Svakom Svakom svakom Siime Eye Firmware |
|
References | () https://seclists.org/fulldisclosure/2024/Jul/14 - Mailing List, Third Party Advisory, Exploit | |
CPE | cpe:2.3:o:svakom:svakom_siime_eye_firmware:14.1.00000001.3.330.0.0.3.14:*:*:*:*:*:*:* cpe:2.3:h:svakom:svakom_siime_eye:-:*:*:*:*:*:*:* |
Information
Published : 2024-11-07 18:15
Updated : 2025-04-24 13:42
NVD link : CVE-2020-11917
Mitre link : CVE-2020-11917
CVE.ORG link : CVE-2020-11917
JSON object : View
Products Affected
svakom
- svakom_siime_eye_firmware
- svakom_siime_eye
CWE
CWE-1188
Initialization of a Resource with an Insecure Default