제출 #595447: 70mai dashcam M300 Improper Access Controls정보

제목70mai dashcam M300 Improper Access Controls
설명Exposed Root Password via Unauthenticated HTTP Server The 70mai Dashcam M300 has port 80 open without authentication such that an attacker connecting to the dashcam's network via default credentials, without needing device-pairing, can access all files on it. From the web server, we obtain the root password hash and derive that it's using an empty password. A remote attacker nearby connected to the dashcam's network can access all files on the web server without going through authentication or device pairing and can obtain the root password.
원천⚠️ https://github.com/geo-chen/70mai/blob/main/README.md#finding-4-exposed-root-password-via-unauthenticated-http-server
사용자
 geochen (UID 78995)
제출2025. 06. 11. PM 05:19 (10 개월 ago)
모더레이션2025. 06. 23. PM 04:11 (12 days later)
상태수락
VulDB 항목313643 [70mai M300 까지 20250611 HTTP Server 정보 공개]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!