CVE-2023-5499

Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:reachfargps:reachfar_gps_firmware:28:*:*:*:*:*:*:*
cpe:2.3:h:reachfargps:reachfar_gps:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
References () https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure - Third Party Advisory () https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure - Third Party Advisory

19 Dec 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-10 14:15

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5499

Mitre link : CVE-2023-5499

CVE.ORG link : CVE-2023-5499


JSON object : View

Products Affected

reachfargps

  • reachfar_gps_firmware
  • reachfar_gps
CWE
CWE-532

Insertion of Sensitive Information into Log File