Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.
References
Link | Resource |
---|---|
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md | Third Party Advisory |
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md | Third Party Advisory |
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md | Third Party Advisory |
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
27 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 |
Information
Published : 2023-05-10 16:15
Updated : 2025-01-27 20:15
NVD link : CVE-2023-30351
Mitre link : CVE-2023-30351
CVE.ORG link : CVE-2023-30351
JSON object : View
Products Affected
tenda
- cp3_firmware
- cp3