Description
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 26 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-03T18:27:44.462Z
Reserved: 2023-12-04T00:00:00.000Z
Link: CVE-2023-50124
Updated: 2024-08-02T22:09:49.714Z
Status : Modified
Published: 2024-01-11T21:15:10.630
Modified: 2024-11-21T08:36:33.683
Link: CVE-2023-50124
No data.
OpenCVE Enrichment
No data.
Weaknesses