Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
auto-maskin dcu 210e firmware vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2018-5399
The Auto-Maskin DCU 210E firmware contains an undocumented Dropbear SSH server, v2015.55, configured to listen on Port 22 while the DCU is running. The Dropbear server is configured with a hard-coded user name and password combination of root / amroot. The server is configured to...
Auto-maskin Dcu-210e Firmware
Auto-maskin Rp-210e Firmware
578
VMScore
CVE-2018-5402
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App use an embedded webserver that uses unencrypted plaintext for the transmission of the administrator PIN Impact: An attacker once authenticated can change configurations, upload new configuration files, and upl...
Auto-maskin Rp 210e Firmware -
Auto-maskin Dcu 210e Firmware -
Auto-maskin Marine Pro Observer -
383
VMScore
CVE-2018-5401
The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communic...
Auto-maskin Rp 210e Firmware -
Auto-maskin Dcu 210e Firmware -
Auto-maskin Marine Pro Observer -
570
VMScore
CVE-2018-5400
The Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. The originating device sends a message in plaintext, 48:65:6c:6c:6f:20:57:6f:72:6c:64, "Hello World" over UDP ports 4444...
Auto-maskin Rp 210e Firmware -
Auto-maskin Dcu 210e Firmware -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started