CRITICAL · 9.8

CVE-2019-16273

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a cov...

Vulnerability Description

DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
DtenD5 Firmware< 1.3.4
DtenD5-
DtenD7 Firmware< 1.3.4
DtenD7-

References

FAQ

What is CVE-2019-16273?

CVE-2019-16273 is a vulnerability with a CVSS score of 9.8 (CRITICAL). DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a cov...

How severe is CVE-2019-16273?

CVE-2019-16273 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2019-16273?

Check the references section above for vendor advisories and patch information. Affected products include: Dten D5 Firmware, Dten D5, Dten D7 Firmware, Dten D7.