Getnexx

Nxg-100b Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 04.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:49

The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) serve...

  • EPSS 0.2%
  • Veröffentlicht 04.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:49

The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.

  • EPSS 0.29%
  • Veröffentlicht 04.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:49

The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.

  • EPSS 0.31%
  • Veröffentlicht 04.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:49

The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm informat...

  • EPSS 0.18%
  • Veröffentlicht 04.04.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 07:39:49

The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.