CVE-2024-25731

The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
Configurations

Configuration 1 (hide)

cpe:2.3:a:elinksmart:esmartcam:2.1.5:*:*:*:*:android:*:*

History

26 Feb 2025, 15:14

Type Values Removed Values Added
CPE cpe:2.3:a:elinksmart:esmartcam:2.1.5:*:*:*:*:android:*:*
References () https://github.com/actuator/com.cn.dq.ipc - () https://github.com/actuator/com.cn.dq.ipc - Third Party Advisory
References () https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 - () https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Elinksmart esmartcam
Elinksmart
CWE CWE-798

21 Nov 2024, 09:01

Type Values Removed Values Added
References () https://github.com/actuator/com.cn.dq.ipc - () https://github.com/actuator/com.cn.dq.ipc -
References () https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 - () https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 -
Summary
  • (es) La aplicación Elink Smart eSmartCam (com.cn.dq.ipc) 2.1.5 para Android contiene claves de cifrado AES codificadas que se pueden extraer de un archivo binario. Por lo tanto, el cifrado puede ser derrotado por un atacante que pueda observar los paquetes de datos (por ejemplo, a través de Wi-Fi).

05 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-05 00:15

Updated : 2025-02-26 15:14


NVD link : CVE-2024-25731

Mitre link : CVE-2024-25731

CVE.ORG link : CVE-2024-25731


JSON object : View

Products Affected

elinksmart

  • esmartcam
CWE
CWE-798

Use of Hard-coded Credentials