The Eques elf smart plug and the mobile app use a hardcoded AES 256 bit key to encrypt the commands and responses between the device and the app. The communication happens over UDP port 27431. An attacker on the local network can use the same key to encrypt and send commands to discover all smart plugs in a network, take over control of a device, and perform actions such as turning it on and off.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/iamckn/eques - Exploit, Third Party Advisory | |
References | () https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-four/ - Exploit, Third Party Advisory | |
References | () https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-one/ - Exploit, Third Party Advisory | |
References | () https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-three/ - Exploit, Third Party Advisory | |
References | () https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-two/ - Exploit, Third Party Advisory |
Information
Published : 2019-08-29 13:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15745
Mitre link : CVE-2019-15745
CVE.ORG link : CVE-2019-15745
JSON object : View
Products Affected
equeshome
- elf_smart_plug
- elf_smart_plug_firmware
CWE
CWE-798
Use of Hard-coded Credentials