إرسال #595447: 70mai dashcam M300 Improper Access Controlsالمعلومات

عنوان70mai dashcam M300 Improper Access Controls
الوصفExposed Root Password via Unauthenticated HTTP Server The 70mai Dashcam M300 has port 80 open without authentication such that an attacker connecting to the dashcam's network via default credentials, without needing device-pairing, can access all files on it. From the web server, we obtain the root password hash and derive that it's using an empty password. A remote attacker nearby connected to the dashcam's network can access all files on the web server without going through authentication or device pairing and can obtain the root password.
المصدر⚠️ https://github.com/geo-chen/70mai/blob/main/README.md#finding-4-exposed-root-password-via-unauthenticated-http-server
المستخدم
 geochen (UID 78995)
ارسال11/06/2025 05:19 PM (10 أشهر منذ)
الاعتدال23/06/2025 04:11 PM (12 days later)
الحالةتمت الموافقة
إدخال VulDB313643 [70mai M300 حتى 20250611 HTTP Server الكشف عن المعلومات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!