Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: INCIBE
Published: 2023-10-10T13:21:59.698Z
Updated: 2023-12-19T14:38:41.121Z
Reserved: 2023-10-10T09:26:26.184Z
Link: CVE-2023-5499
JSON object: View
NVD Information
Status : Modified
Published: 2023-10-10T14:15:11.213
Modified: 2023-12-19T15:15:08.913
Link: CVE-2023-5499
JSON object: View
Redhat Information
No data.
CWE