Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://hacked.camera/ | |
https://redprocyon.com |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-08-10T15:26:43
Updated: 2024-08-04T10:34:38.216Z
Reserved: 2020-03-01T00:00:00
Link: CVE-2020-9529
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-08-10T16:15:12.410
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-9529
Redhat
No data.