First published: Wed May 10 2023(Updated: )
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Cp3 Firmware | =11.10.00.2211041355 | |
Tenda CP3 | ||
All of | ||
Tenda Cp3 Firmware | =11.10.00.2211041355 | |
Tenda CP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-30352.
The severity of CVE-2023-30352 is critical with a CVSS score of 9.8.
The affected software version is Tenda Cp3 Firmware 11.10.00.2211041355.
This vulnerability allows an attacker to gain access to the RTSP feed using a hard-coded default password.
To fix this vulnerability, it is recommended to update the Tenda Cp3 Firmware to a version that does not have the hard-coded default password.