Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-29844
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Default credentials on web interface of Evolution Controller Versions allows attackers to login and perform administrative functions
Source: NVD (National Vulnerability Database)
Vulnerability Description
Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1392
Source: NVD (National Vulnerability Database)
Vulnerability Title
DirectCyber Evolution Controller 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
DirectCyber Evolution Controller是DirectCyber公司的一款门禁控制器软件,用于控制器对设施的物理访问。 DirectCyber Evolution Controller 2.x 版本及之前版本存在安全漏洞,该漏洞源于 Web 界面上的默认凭据允许任何人直接登录服务器以执行管理功能。安装或首次登录时,应用程序不会要求用户更改密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
CS Technologies AustraliaEvolution Controller 2.x -
II. Public POCs for CVE-2024-29844
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-29844
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-29844

No comments yet


Leave a comment