An exploitable vulnerability exists in the Wi-Fi Access Point feature of the Roav A1 Dashcam running version RoavA1SWV1.9. A set of default credentials can potentially be used to connect to the device. An attacker can connect to the AP to trigger this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 | Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 04:06
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 - Third Party Advisory | 
07 Jun 2022, 16:44
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 3.3 v3 : 8.8 | 
Information
                Published : 2019-05-13 16:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-4017
Mitre link : CVE-2018-4017
CVE.ORG link : CVE-2018-4017
JSON object : View
Products Affected
                anker-in
- roav_dashcam_a1_firmware
- roav_dashcam_a1
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
