cvelist/2020/9xxx/CVE-2020-9529.json

67 lines
2.4 KiB
JSON
Raw Normal View History

2020-03-01 22:01:08 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-08-10 16:01:24 +00:00
"ID": "CVE-2020-9529",
"STATE": "PUBLIC"
2020-03-01 22:01:08 +00:00
},
2020-08-10 16:01:24 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-03-01 22:01:08 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-08-10 16:01:24 +00:00
"value": "Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hacked.camera/",
"url": "https://hacked.camera/"
},
{
"url": "https://redprocyon.com",
"refsource": "MISC",
"name": "https://redprocyon.com"
2020-03-01 22:01:08 +00:00
}
]
}
}