"TITLE":"The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN"
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"DCU-210E ",
"version":{
"version_data":[
{
"affected":"<",
"platform":"ARMv7",
"version_name":"3.7",
"version_value":"3.7"
}
]
}
},
{
"product_name":"RP-210E",
"version":{
"version_data":[
{
"affected":"<",
"platform":"ARMv7",
"version_name":"3.7",
"version_value":"3.7"
}
]
}
}
]
},
"vendor_name":"Auto-Maskin"
}
]
}
},
"credit":[
{
"lang":"eng",
"value":"Reporters: Brian Satira, Brian Olson, Organization: Project Gunsway"
"value":"The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7."