BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted.
References
Link | Resource |
---|---|
https://blackvue.com | Product |
https://github.com/eyJhb/blackvue-cve-2022 | Exploit Third Party Advisory |
https://github.com/eyJhb/blackvue-cve-2023 | Exploit Third Party Advisory |
https://shop.blackvue.com/product/dr750-2ch-ir-lte/ | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-04-13T00:00:00
Updated: 2023-04-13T00:00:00
Reserved: 2023-03-05T00:00:00
Link: CVE-2023-27746
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-13T20:15:15.803
Modified: 2023-04-21T19:06:09.237
Link: CVE-2023-27746
JSON object: View
Redhat Information
No data.
CWE