Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
References
Link | Resource |
---|---|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2024-01-11T00:00:00
Updated: 2024-01-11T20:21:20.278558
Reserved: 2023-12-04T00:00:00
Link: CVE-2023-50124
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-11T21:15:10.630
Modified: 2024-01-19T14:42:04.497
Link: CVE-2023-50124
JSON object: View
Redhat Information
No data.
CWE