An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66 | Exploit Third Party Advisory | 
| https://support.mygeeni.com/hc/en-us | Vendor Advisory | 
| https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66 | Exploit Third Party Advisory | 
| https://support.mygeeni.com/hc/en-us | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2021-01-26 18:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29001
Mitre link : CVE-2020-29001
CVE.ORG link : CVE-2020-29001
JSON object : View
Products Affected
                merkuryinnovations
- merkury_mi-cw024
- merkury_mi-cw017_firmware
- geeni_gnc-cw025_firmware
- geeni_gnc-cw028_firmware
- geeni_gnc-cw028
- geeni_gnc-cw025
- merkury_mi-cw024_firmware
- merkury_mi-cw017
CWE
                
                    
                        
                        CWE-312
                        
            Cleartext Storage of Sensitive Information
