Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2024-7205
Disclosure Date: July 31, 2024 (last updated July 31, 2024)
When the device is shared, the homepage module are before 2.19.0 in eWeLink Cloud Service allows Secondary user to take over devices as primary user via sharing unnecessary device-sensitive information.
0
Attacker Value
Unknown
CVE-2024-3130
Disclosure Date: April 01, 2024 (last updated January 05, 2025)
Hard-coded Credentials in CoolKit eWeLlink app are before 5.4.x on Android and IOS allows local attacker to unauthorized access to sensitive data via Decryption algorithm and key obtained after decompiling app
0
Attacker Value
Unknown
CVE-2023-6998
Disclosure Date: December 30, 2023 (last updated October 10, 2024)
Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0.
0
Attacker Value
Unknown
CVE-2021-27941
Disclosure Date: May 06, 2021 (last updated February 22, 2025)
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during a device pairing process.
0
Attacker Value
Unknown
CVE-2020-12702
Disclosure Date: February 24, 2021 (last updated February 22, 2025)
Weak encryption in the Quick Pairing mode in the eWeLink mobile application (Android application V4.9.2 and earlier, iOS application V4.9.1 and earlier) allows physically proximate attackers to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during the pairing process.
0