cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-24488,https://securityvulnerability.io/vulnerability/CVE-2024-24488,Local Information Disclosure in Tenda Technology CP3V2.0 Router,"A security vulnerability in the Shenzen Tenda Technology CP3V2.0 router enables a local attacker to access sensitive information through exploitation of the router's password component. This flaw could potentially expose user credentials and other confidential data, posing a significant risk to the security and privacy of affected users. It is crucial for users of this product version to apply security updates promptly to mitigate any potential exploits.",Tenda,Cp3 Firmware,5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-02-07T00:00:00.000Z,0 CVE-2023-30351,https://securityvulnerability.io/vulnerability/CVE-2023-30351,Weak Encryption in Shenzen Tenda Technology IP Camera Leads to Default Password Vulnerability,"The Shenzen Tenda Technology CP3 IP camera has been identified to possess a significant authentication issue due to a hard-coded default password for the root user. This password is stored using weak encryption, making it susceptible to unauthorized access. Attackers can exploit this vulnerability to connect to the TELNET service or UART, potentially leading to a breach of sensitive information and control over the device. Users are advised to change default credentials and implement stronger security measures to safeguard their devices.",Tenda,Cp3 Firmware,7.5,HIGH,0.0008200000156648457,false,,false,false,false,,,false,false,,2023-05-10T00:00:00.000Z,0 CVE-2023-30352,https://securityvulnerability.io/vulnerability/CVE-2023-30352,Hard-Coded Password Vulnerability in Tenda IP Camera,"The Tenda IP Camera CP3 has been identified to possess a significant security flaw due to a hard-coded default password associated with its RTSP feed. This vulnerability potentially exposes the camera's streaming capabilities to unauthorized access, making it critical for users to change the default credentials to maintain the security of their video feed. This issue emphasizes the importance of secure default settings in IoT devices.",Tenda,Cp3 Firmware,9.8,CRITICAL,0.0013599999947473407,false,,false,false,false,,,false,false,,2023-05-10T00:00:00.000Z,0 CVE-2023-30353,https://securityvulnerability.io/vulnerability/CVE-2023-30353,Remote Code Execution Vulnerability in Shenzen Tenda Technology IP Camera,"The Tenda IP Camera CP3 is vulnerable to an unauthenticated remote code execution flaw that can be exploited through a specially crafted XML document. This security risk allows attackers to execute arbitrary commands on the device without any authentication, potentially leading to unauthorized access and control over the camera. It is crucial for users to address this vulnerability to protect their systems from potential exploitation.",Tenda,Cp3 Firmware,9.8,CRITICAL,0.002420000033453107,false,,false,false,false,,,false,false,,2023-05-10T00:00:00.000Z,0 CVE-2023-30354,https://securityvulnerability.io/vulnerability/CVE-2023-30354,Physical Access Vulnerability in Shenzen Tenda Technology IP Camera,"The Shenzen Tenda Technology IP Camera CP3 suffers from a vulnerability that allows an attacker with physical access to the device to extract sensitive information. Specifically, unauthorized users can view the Wi-Fi password and exploit a hardcoded boot password for console access. This exposure could lead to unauthorized control of the device, making it crucial for users to implement physical security measures to prevent access.",Tenda,Cp3 Firmware,9.8,CRITICAL,0.0021200000774115324,false,,false,false,false,,,false,false,,2023-05-10T00:00:00.000Z,0 CVE-2023-30356,https://securityvulnerability.io/vulnerability/CVE-2023-30356,Integrity Check Vulnerability in Shenzen Tenda Technology IP Camera,"A significant security flaw has been identified in the Shenzen Tenda Technology IP Camera CP3, specifically in version V11.10.00.2211041355. This vulnerability stems from a lack of adequate integrity check mechanisms, which allows unauthorized users to upload and install modified firmware. Such an exploit could lead to unauthorized access, data leaks, and potential control over the device, posing serious risks to both user privacy and network security.",Tenda,Cp3 Firmware,7.5,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2023-05-10T00:00:00.000Z,0