First published: Mon Feb 24 2025(Updated: )
Improper access control in the HTTP server in YI Car Dashcam v3.88 allows unrestricted file downloads, uploads, and API commands. API commands can also be made to make unauthorized modifications to the device settings, such as disabling recording, disabling sounds, factory reset.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yitechnology Yi Car Dashcam | ||
All of | ||
Yitechnology Yi Car Dashcam Firmware | =3.88 | |
Yitechnology Yi Car Dashcam |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56897 is high due to improper access control allowing unauthorized actions on the YI Car Dashcam.
To fix CVE-2024-56897, it is recommended to update the YI Car Dashcam to the latest firmware version that addresses this vulnerability.
The risks associated with CVE-2024-56897 include unauthorized file downloads, uploads, and modifications to device settings.
CVE-2024-56897 specifically affects YI Car Dashcam firmware version 3.88.
CVE-2024-56897 exploits improper access control in the HTTP server to allow unrestricted access to API commands.