8.8
CVE-2018-4017
- EPSS 0.18%
- Veröffentlicht 13.05.2019 16:29:00
- Zuletzt bearbeitet 21.11.2024 04:06:30
- Quelle talos-cna@cisco.com
- CVE-Watchlists
- Unerledigt
An exploitable vulnerability exists in the Wi-Fi Access Point feature of the Roav A1 Dashcam running version RoavA1SWV1.9. A set of default credentials can potentially be used to connect to the device. An attacker can connect to the AP to trigger this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Anker-in ≫ Roav Dashcam A1 Firmware Versionroava1swv1.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.18% | 0.397 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 3.3 | 6.5 | 2.9 |
AV:A/AC:L/Au:N/C:P/I:N/A:N
|
| talos-cna@cisco.com | 7.1 | 1.2 | 5.9 |
CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.