Skip to content

Instantly share code, notes, and snippets.

@tj-oconnor
Last active January 26, 2021 10:34
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tj-oconnor/e21adcf9c0539a12ad2841102928cbd5 to your computer and use it in GitHub Desktop.
Save tj-oconnor/e21adcf9c0539a12ad2841102928cbd5 to your computer and use it in GitHub Desktop.
CVE-2020-28998
------------------------------------------
CVE-2020-28998.
------------------------------------------
[Description]
An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices.
A vulnerability exists in the Telnet service
that allows a remote attacker to take full control of the device with a
high-privileged account. The vulnerability exists because a system
account has a default and static password.
[Additional Information]
Reported to Merkury Innovations on 21 Nov 20.
[Vulnerability Type]
Incorrect Access Control
[Vendor of Product]
Geeni
[Affected Product Code Base]
GNC-CW013 Doorbell - Version 1.8.1 (Current)
[Affected Component]
Telnet Service
[Attack Type]
Remote
[Impact Code execution]
true
[Attack Vectors]
An attacker may login to the exposed telnet service with the hard-coded credentials.
[Discoverer]
TJ OConnor, Daniel Campos: Florida Tech IoT S&P Lab
[References]
https://research.fit.edu/media/site-specific/researchfitedu/iot-lab/Geeni_Disclosures.pdf
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment