First published: Wed May 10 2023(Updated: )
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Cp3 Firmware | =11.10.00.2211041355 | |
Tenda CP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30351 is a vulnerability found in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 that contains a hard-coded default password for root, stored using weak encryption.
CVE-2023-30351 allows attackers to connect to the TELNET service (or UART) by using the exposed credentials.
CVE-2023-30351 has a severity rating of 7.5, which is considered high.
To fix CVE-2023-30351, it is recommended to update the Shenzen Tenda Technology IP Camera CP3 firmware to a version that addresses the vulnerability and change the default root password.
No, Tenda CP3 is not affected by CVE-2023-30351.