HIGH · 7.5

CVE-2023-5499

Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could r...

Vulnerability Description

Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
ReachfargpsReachfar Gps Firmware28
ReachfargpsReachfar Gps-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-5499?

CVE-2023-5499 is a vulnerability with a CVSS score of 7.5 (HIGH). Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could r...

How severe is CVE-2023-5499?

CVE-2023-5499 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-5499?

Check the references section above for vendor advisories and patch information. Affected products include: Reachfargps Reachfar Gps Firmware, Reachfargps Reachfar Gps.