CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification. |
The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object references vulnerability on endpoint and POST parameter “Device ID,” which accepts arbitrary device IDs. |
An unauthenticated attacker can check the existence of usernames in the system by querying an API. |
An unauthenticated attacker can obtain a user's plant list by knowing the username. |
An unauthenticated attacker can obtain a list of smart devices by knowing a valid username. |
An unauthenticated attacker can get users' emails by knowing usernames. A password reset email will be sent in response to this unsolicited request. |
An unauthenticated attacker can obtain a serial number of a smart meter(s) using its owner's username. |
An attacker can change registered email addresses of other users and take over arbitrary accounts. |
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "rooms"). |
Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., "scenes"). |
An attacker can get information about the groups of the smart home devices for arbitrary users (i.e., "rooms"). |
Unauthenticated attackers can query an API endpoint and get device details. |
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers). |
An unauthenticated attacker can obtain other users' charger information. |
An unauthenticated attacker can obtain EV charger energy consumption information of other users. |
An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID. |
An unauthenticated attacker can delete any user's "rooms" by knowing the user's and room IDs. |
An unauthenticated attacker can hijack other users' devices and potentially control them. |
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users. |
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users. |