An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-11012 An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T02:39:10.227Z

Reserved: 2020-02-17T00:00:00

Link: CVE-2019-20467

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-22T13:15:08.027

Modified: 2024-11-21T04:38:33.193

Link: CVE-2019-20467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses