We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5634



AssignerCERT-PL
Reserved2024-06-04
Published2024-07-09
Updated2024-08-01

Description

Longse model LBH30FE200W cameras, as well as products based on this device, make use of telnet passwords which follow a specific pattern. Once the pattern is known, brute-forcing the password becomes relatively easy.  Additionally, every camera with the same firmware version shares the same password.



HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1391 Use of Weak Credentials

Product status

Default status
affected

Any version
affected

Default status
affected

Any version
affected

Credits

Adam Zambrzycki 0x400618bef0

References

https://zamel.com/pl/gardi/zestaw-monitoringu-bezprzewodowego-wi-fi-typ-zmb-01 product

https://cert.pl/en/posts/2024/07/CVE-2024-5631/ third-party-advisory

https://cert.pl/posts/2024/07/CVE-2024-5631/ third-party-advisory

cve.org CVE-2024-5634

nvd.nist.gov CVE-2024-5634

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.