漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Shenzhen Hichip Vision Technology Firmware 安全漏洞
Vulnerability Description
Shenzhen Hichip Vision Technology Firmware是中国深圳海芯威视(Shenzhen Hichip Vision)公司的一款用于物联网设备中的固件。 Shenzhen Hichip Vision Technology Firmware V6版本至V20版本中存在提权漏洞。攻击者可利用该漏洞重置设备的管理员密码。以下产品及版本受到影响:Accfly;Alptop;Anlink;Besdersec;BOAVISION;COOAU;CPVAN;Ctronics;D3D Sec
CVSS Information
N/A
Vulnerability Type
N/A