{ "CVE_data_meta": { "ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2019-08-20T16:00:00.000Z", "ID": "CVE-2019-13405", "STATE": "PUBLIC", "TITLE": "Advan VD-1 allows a remote user to enable Android Debug Bridge without any authentication" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "AndroVideo", "product": { "product_data": [ { "product_name": "Advan VD-1 firmware", "version": { "version_data": [ { "version_value": "230" } ] } } ] } } ] } }, "credit": [ { "lang": "eng", "value": "Keniver Wang (CHT Security) " } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A broken access control vulnerability found in Advan VD-1 firmware version 230 leads to insecure ADB service. An attacker can send a POST request to cgibin/AdbSetting.cgi to enable ADB without any authentication then take the compromised device as a relay or to install mining software." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Broken access control" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md", "refsource": "CONFIRM", "url": "https://gist.github.com/keniver/f5155b42eb278ec0273b83565b64235b#file-androvideo-advan-vd-1-multiple-vulnerabilities-md" }, { "name": "https://tvn.twcert.org.tw/taiwanvn/TVN-201906006", "refsource": "CONFIRM", "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201906006" }, { "name": "http://surl.twcert.org.tw/VeNHn", "refsource": "CONFIRM", "url": "http://surl.twcert.org.tw/VeNHn" } ] }, "source": { "discovery": "EXTERNAL" } }