Description
DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-7072 | DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS. |
References
| Link | Providers |
|---|---|
| https://www.forescout.com/company/blog/dten-vulnerability/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:10:41.695Z
Reserved: 2019-09-12T00:00:00.000Z
Link: CVE-2019-16273
No data.
Status : Modified
Published: 2020-01-06T20:15:11.960
Modified: 2024-11-21T04:30:25.720
Link: CVE-2019-16273
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD