All the vulnerabilites related to E-Lins - H820
cve-2024-11630
Vulnerability from cvelistv5
Published
2024-11-22 22:00
Modified
2024-11-22 22:00
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS score ?
Summary
E-Lins H685/H685f/H700/H720/H750/H820/H820Q/H820Q0/H900 OEM Backend hard-coded credentials
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.285916 | vdb-entry | |
https://vuldb.com/?ctiid.285916 | signature, permissions-required | |
https://vuldb.com/?submit.444738 | third-party-advisory | |
https://github.com/I3eg1nner/iot-vuln/blob/main/E-lins/Hard-Coded%20Credential%20Vulnerability%20in%20E-Lins%20Routers.md | exploit |
Impacted products
{ "containers": { "cna": { "affected": [ { "modules": [ "OEM Backend" ], "product": "H685", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H685f", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H700", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H720", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H750", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H820", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H820Q", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H820Q0", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] }, { "modules": [ "OEM Backend" ], "product": "H900", "vendor": "E-Lins", "versions": [ { "status": "affected", "version": "3.0" }, { "status": "affected", "version": "3.1" }, { "status": "affected", "version": "3.2" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "liutong (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in E-Lins H685, H685f, H700, H720, H750, H820, H820Q, H820Q0 and H900 up to 3.2 and classified as critical. This vulnerability affects unknown code of the component OEM Backend. The manipulation leads to hard-coded credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In E-Lins H685, H685f, H700, H720, H750, H820, H820Q, H820Q0 and H900 bis 3.2 wurde eine kritische Schwachstelle gefunden. Das betrifft eine unbekannte Funktionalit\u00e4t der Komponente OEM Backend. Durch Manipulation mit unbekannten Daten kann eine hard-coded credentials-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme werden Anpassungen an der Konfiguration empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "Hard-coded Credentials", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-259", "description": "Use of Hard-coded Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T22:00:07.324Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-285916 | E-Lins H685/H685f/H700/H720/H750/H820/H820Q/H820Q0/H900 OEM Backend hard-coded credentials", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.285916" }, { "name": "VDB-285916 | CTI Indicators (IOB, IOC, TTP)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.285916" }, { "name": "Submit #444738 | E-Lins Technology E-Lins H685 Routers \u003c=v3.2.337 Hard-coded Credentials", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.444738" }, { "tags": [ "exploit" ], "url": "https://github.com/I3eg1nner/iot-vuln/blob/main/E-lins/Hard-Coded%20Credential%20Vulnerability%20in%20E-Lins%20Routers.md" } ], "timeline": [ { "lang": "en", "time": "2024-11-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2024-11-22T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2024-11-22T18:05:24.000Z", "value": "VulDB entry last update" } ], "title": "E-Lins H685/H685f/H700/H720/H750/H820/H820Q/H820Q0/H900 OEM Backend hard-coded credentials" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2024-11630", "datePublished": "2024-11-22T22:00:07.324Z", "dateReserved": "2024-11-22T17:00:20.839Z", "dateUpdated": "2024-11-22T22:00:07.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }