Vulnerability Description
Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Reachfargps | Reachfar Gps Firmware | 28 |
| Reachfargps | Reachfar Gps | - |
Related Weaknesses (CWE)
References
- https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-informaThird Party Advisory
- https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-informaThird Party Advisory
FAQ
What is CVE-2023-5499?
CVE-2023-5499 is a vulnerability with a CVSS score of 7.5 (HIGH). Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could r...
How severe is CVE-2023-5499?
CVE-2023-5499 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5499?
Check the references section above for vendor advisories and patch information. Affected products include: Reachfargps Reachfar Gps Firmware, Reachfargps Reachfar Gps.