CVE-2024-25731

HIGH

Elinksmart Esmartcam - Hard-coded Credentials

Title source: rule
STIX 2.1

Description

The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).

Exploits (1)

nomisec NO CODE 1 stars
by actuator · poc
https://github.com/actuator/com.cn.dq.ipc

Scores

CVSS v3 7.5
EPSS 0.0503
EPSS Percentile 89.8%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-798
Status published
Products (1)
elinksmart/esmartcam 2.1.5
Published Mar 05, 2024
Tracked Since Feb 18, 2026