An issue was discovered on Geeni GNC-CW028 Camera 2.7.2, Geeni GNC-CW025 Doorbell 2.9.5, Merkury MI-CW024 Doorbell 2.9.6, and Merkury MI-CW017 Camera 2.9.6 devices. A vulnerability exists in the RESTful Services API that allows a remote attacker to take full control of the camera with a high-privileged account. The vulnerability exists because a static username and password are compiled into the ppsapp RESTful application.
References
Link | Resource |
---|---|
https://gist.github.com/tj-oconnor/371d34342c0cc2be015cc89d6dc2bc66 | Exploit Third Party Advisory |
https://support.mygeeni.com/hc/en-us | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2021-01-26 10:15
Updated : 2021-02-02 17:26
NVD link : CVE-2020-29001
Mitre link : CVE-2020-29001
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
merkuryinnovations
- merkury_mi-cw024_firmware
- merkury_mi-cw017
- geeni_gnc-cw028_firmware
- geeni_gnc-cw028
- merkury_mi-cw024
- merkury_mi-cw017_firmware
- geeni_gnc-cw025_firmware
- geeni_gnc-cw025