| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2018-5399 | The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running and is configured with a hard-coded credentials | Auto-Maskin | DCU-210E | 超危 | - | 2018-10-08 15:00:00 | Deep Dive |
| CVE-2018-5400 | The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices, resulting in an origin validation error | Auto-Maskin | DCU-210E | 超危 | - | 2018-10-08 15:00:00 | Deep Dive |
| CVE-2018-5401 | The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors | Auto-Maskin | DCU-210E | 中危 | - | 2018-10-08 15:00:00 | Deep Dive |
| CVE-2018-5402 | The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN | Auto-Maskin | DCU-210E | 高危 | - | 2018-10-08 15:00:00 | Deep Dive |