2024-12-08 03:06:42 +00:00

60 lines
2.3 KiB
JSON

{
"id": "CVE-2024-48214",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T18:15:07.420",
"lastModified": "2024-11-01T12:57:03.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "KERUI HD 3MP 1080P Tuya Camera 1.0.4 has a command injection vulnerability in the module that connects to the local network via a QR code. This vulnerability allows an attacker to create a custom, unauthenticated QR code and abuse one of the parameters, either SSID or PASSWORD, in the JSON data contained within the QR code. By that, the attacker can execute arbitrary code on the camera."
},
{
"lang": "es",
"value": "KERUI HD 3MP 1080P Tuya Camera 1.0.4 tiene una vulnerabilidad de inyecci\u00f3n de comandos en el m\u00f3dulo que se conecta a la red local a trav\u00e9s de un c\u00f3digo QR. Esta vulnerabilidad permite a un atacante crear un c\u00f3digo QR personalizado y no autenticado y abusar de uno de los par\u00e1metros, ya sea SSID o PASSWORD, en los datos JSON contenidos en el c\u00f3digo QR. De esta manera, el atacante puede ejecutar c\u00f3digo arbitrario en la c\u00e1mara."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shenhavmor/exploiting-a-chinese-camera-for-fun-cve-2024-48214-2d56848870c2",
"source": "cve@mitre.org"
}
]
}