First published: Wed May 10 2023(Updated: )
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Cp3 Firmware | =11.10.00.2211041355 | |
Tenda CP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-30354.
The severity of CVE-2023-30354 is critical with a CVSS score of 9.8.
The software version affected by CVE-2023-30354 is Tenda Cp3 Firmware 11.10.00.2211041355.
CVE-2023-30354 allows physical access to U-Boot via the UART, revealing the Wi-Fi password and allowing console access with a hardcoded boot password.
At the moment, there are no known fixes or workarounds for CVE-2023-30354. It is recommended to contact the vendor for further assistance.