Vulnerability Description
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tenda | Cp3 Firmware | 11.10.00.2211041355 |
| Tenda | Cp3 | - |
Related Weaknesses (CWE)
References
- https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.mdThird Party Advisory
- https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.mdThird Party Advisory
- https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.mdThird Party Advisory
- https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RRA.mdThird Party Advisory
FAQ
What is CVE-2023-30351?
CVE-2023-30351 is a vulnerability with a CVSS score of 7.5 (HIGH). Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers ...
How severe is CVE-2023-30351?
CVE-2023-30351 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-30351?
Check the references section above for vendor advisories and patch information. Affected products include: Tenda Cp3 Firmware, Tenda Cp3.