First published: Thu Aug 29 2019(Updated: )
A broken access control vulnerability found in Advan VD-1 firmware version 230 leads to insecure ADB service. An attacker can send a POST request to cgibin/AdbSetting.cgi to enable ADB without any authentication then take the compromised device as a relay or to install mining software.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Androvideo Vd 1 | =230 | |
Androvideo Vd 1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13405 is classified as a high severity vulnerability due to broken access controls allowing unauthenticated access to critical system functions.
To fix CVE-2019-13405, it is recommended to update the Advan VD-1 firmware to a version that addresses the broken access control issues.
CVE-2019-13405 allows attackers to enable ADB on the device without authentication, potentially leading to unauthorized access and control.
Devices running Advan VD-1 firmware version 230 are affected by CVE-2019-13405.
Yes, CVE-2019-13405 can enable an attacker to exploit the device for various malicious activities including remote code execution.