DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
References
Link | Resource |
---|---|
https://www.forescout.com/company/blog/dten-vulnerability/ | Third Party Advisory |
Information
Published : 2020-01-06 12:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-16273
Mitre link : CVE-2019-16273
JSON object : View
CWE
Products Affected
dten
- d5
- d7
- d5_firmware
- d7_firmware