Note:
This project will be discontinued after December 13, 2021. [more]
Product:
D5_firmware
(Dten)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-01-06 | CVE-2019-16274 | DTEN D5 before 1.3 and D7 before 1.3 devices transfer customer data files via unencrypted HTTP. | D5_firmware, D7_firmware | 7.5 | ||
2020-01-06 | CVE-2019-16271 | DTEN D5 and D7 before 1.3.2 devices allows remote attackers to read saved whiteboard image PDF documents via storage/emulated/0/Notes/PDF on TCP port 8080 without authentication. | D5_firmware, D7_firmware | N/A | ||
2020-01-06 | CVE-2019-16273 | DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS. | D5_firmware, D7_firmware | N/A | ||
2020-01-06 | CVE-2019-16272 | On DTEN D5 and D7 before 1.3.4 devices, factory settings allows for firmware reflash and Android Debug Bridge (adb) enablement. | D5_firmware, D7_firmware | N/A |