Gửi #512419: IROAD Dashcam APK 5.2.5 Plaintext Password in Configuration Filethông tin

tiêu đềIROAD Dashcam APK 5.2.5 Plaintext Password in Configuration File
Mô tảHardcoded credentials in APK (IROAD <= v5.2.5) to ports 9091 and 9092 - The IROAD X5 mobile application (version 5.2.5 and below) contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092: a) Once IRoad SSID is connected to, the attacker sends a crafted authentication command with "TibetList" and "000000" to list settings of the dashcam at port 9091. b) There's a separate set of credentials for port 9092 (stream) that is exposed in plaintext as well, "admin" + "tibet". c) For settings, it's "adim" + "000000"
Nguồn⚠️ https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-2-hardcoded-credentials-in-apk-iroad--v525-to-ports-9091-and-9092
Người dùng
 geochen (UID 78995)
Đệ trình02/03/2025 17:57 (cách đây 1 Năm)
Kiểm duyệt15/03/2025 19:22 (13 days later)
Trạng tháiđược chấp nhận
Mục VulDB299808 [IROAD X5 Mobile App đến 5.2.5 trên Android API Endpoint xác thực yếu]
điểm20

Want to know what is going to be exploited?

We predict KEV entries!