The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upload executable code via file upload for firmware updates. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and the Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7.
2018-10-08T15:29:02.977
2024-11-21T04:08:44.850
Modified
CVSSv3.0: 9.1 (CRITICAL)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | auto-maskin | rp_210e_firmware | - | Yes |
Hardware | arm | arm7 | < 3.7 | No |
Hardware | auto-maskin | rp_210e | - | No |
Operating System | auto-maskin | dcu_210e_firmware | - | Yes |
Hardware | arm | arm7 | < 3.7 | No |
Hardware | auto-maskin | dcu_210e | - | No |
Application | auto-maskin | marine_pro_observer | - | Yes |