Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2023-4617
Disclosure Date: December 19, 2024 (last updated December 19, 2024)
Incorrect authorization vulnerability in HTTP POST method in Govee Home application on Android and iOS allows remote attacker to control devices owned by other users via changing "device", "sku" and "type" fields' values.
This issue affects Govee Home applications on Android and iOS in versions before 5.9.
0
Attacker Value
Unknown
CVE-2023-45956
Disclosure Date: October 30, 2023 (last updated November 07, 2023)
An issue discovered in Govee LED Strip v3.00.42 allows attackers to cause a denial of service via crafted Move and MoveWithOnoff commands.
0
Attacker Value
Unknown
CVE-2023-44689
Disclosure Date: October 11, 2023 (last updated October 18, 2023)
e-Gov Client Application (Windows version) versions prior to 2.1.1.0 and e-Gov Client Application (macOS version) versions prior to 1.1.1.0 are vulnerable to improper authorization in handler for custom URL scheme. A crafted URL may direct the product to access an arbitrary website. As a result, the user may become a victim of a phishing attack.
0
Attacker Value
Unknown
CVE-2023-42189
Disclosure Date: October 10, 2023 (last updated February 16, 2024)
Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a crafted script to the KeySetRemove function.
0
Attacker Value
Unknown
CVE-2023-3612
Disclosure Date: September 11, 2023 (last updated October 08, 2023)
Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.
0
Attacker Value
Unknown
CVE-2021-43284
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).
0
Attacker Value
Unknown
CVE-2021-43283
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.
0
Attacker Value
Unknown
CVE-2021-43282
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
0
Attacker Value
Unknown
CVE-2020-15744
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
Stack-based Buffer Overflow vulnerability in the ONVIF server component of Victure PC420 smart camera allows an attacker to execute remote code on the target device. This issue affects: Victure PC420 firmware version 1.2.2 and prior versions.
0
Attacker Value
Unknown
CVE-2019-15940
Disclosure Date: October 01, 2019 (last updated November 27, 2024)
Victure PC530 devices allow unauthenticated TELNET access as root.
0