Vulnerability Description
DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dten | D5 Firmware | < 1.3.4 |
| Dten | D5 | - |
| Dten | D7 Firmware | < 1.3.4 |
| Dten | D7 | - |
References
- https://www.forescout.com/company/blog/dten-vulnerability/Third Party Advisory
- https://www.forescout.com/company/blog/dten-vulnerability/Third Party Advisory
FAQ
What is CVE-2019-16273?
CVE-2019-16273 is a vulnerability with a CVSS score of 9.8 (CRITICAL). DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a cov...
How severe is CVE-2019-16273?
CVE-2019-16273 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-16273?
Check the references section above for vendor advisories and patch information. Affected products include: Dten D5 Firmware, Dten D5, Dten D7 Firmware, Dten D7.