Vulnerability Description
Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inim | Smartliving 505 Firmware | <= 6.0 |
| Inim | Smartliving 505 | - |
| Inim | Smartliving 515 Firmware | <= 6.0 |
| Inim | Smartliving 515 | - |
| Inim | Smartliving 1050 Firmware | <= 6.0 |
| Inim | Smartliving 1050 | - |
| Inim | Smartliving 1050G3 Firmware | <= 6.0 |
| Inim | Smartliving 1050G3 | - |
| Inim | Smartliving 10100L Firmware | <= 6.0 |
| Inim | Smartliving 10100L | - |
| Inim | Smartliving 10100Lg3 Firmware | <= 6.0 |
| Inim | Smartliving 10100Lg3 | - |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/47763Third Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.phpThird Party Advisory
- https://www.exploit-db.com/exploits/47763Third Party AdvisoryVDB Entry
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5546.phpThird Party Advisory
FAQ
What is CVE-2020-21995?
CVE-2020-21995 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.
How severe is CVE-2020-21995?
CVE-2020-21995 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-21995?
Check the references section above for vendor advisories and patch information. Affected products include: Inim Smartliving 505 Firmware, Inim Smartliving 505, Inim Smartliving 515 Firmware, Inim Smartliving 515, Inim Smartliving 1050 Firmware.