Impact
The vulnerability is the presence of hard‑coded credentials in the i‑SENS SmartLog App component air.SmartLog.android up to version 2.6.8 on Android, and it maps to CWE‑259 and CWE‑798. The flaw allows local authentication bypass for the application itself; the available description does not indicate further consequences such as data disclosure or tampering beyond the application’s own use of the credentials.
Affected Systems
Affected vendor: i‑SENS SmartLog App. Product component: air.SmartLog.android. All releases of the Android application up to version 2.6.8 are vulnerable. No specific Android OS or device versions are mentioned, so any device running the vulnerable app could be impacted.
Risk and Exploitability
The CVSS score of 4.8 places the vulnerability in the low severity range. The EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is local only; an exploit is publicly available that extracts the embedded credentials, but no remote code execution or denial‑of‑service capabilities are described.
OpenCVE Enrichment