Note:
This project will be discontinued after December 13, 2021. [more]
Product:
E50x\-E1_firmware
(Vizio)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-08-02 | CVE-2021-27943 | The pairing procedure used by the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs and mobile application is vulnerable to a brute-force attack (against only 10000 possibilities), allowing a threat actor to forcefully pair the device, leading to remote control of the TV settings and configurations. | E50x\-E1_firmware, P65\-F1_firmware | 7.5 | ||
2021-08-03 | CVE-2021-27942 | Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs allow a threat actor to execute arbitrary code from a USB drive via the Smart Cast functionality, because files on the USB drive are effectively under the web root and can be executed. | E50x\-E1_firmware, P65\-F1_firmware | 6.8 | ||
2021-08-26 | CVE-2021-27944 | Several high privileged APIs on the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs do not enforce access controls, allowing an unauthenticated threat actor to access privileged functionality, leading to OS command execution. The specific attack methodology is a file upload. | E50x\-E1_firmware, P65\-F1_firmware | 9.8 |