Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenda cp3 firmware 11.10.00.2211041355 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-30351
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 exists to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows malicious users to connect to the TELNET service (or UART) by using the exposed credentials.
Tenda Cp3 Firmware 11.10.00.2211041355
NA
CVE-2023-30353
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document.
Tenda Cp3 Firmware 11.10.00.2211041355
NA
CVE-2023-30354
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access.
Tenda Cp3 Firmware 11.10.00.2211041355
NA
CVE-2023-30356
Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows malicious users to update the device with crafted firmware
Tenda Cp3 Firmware 11.10.00.2211041355
NA
CVE-2023-30352
Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 exists to contain a hard-coded default password for the RTSP feed.
Tenda Cp3 Firmware 11.10.00.2211041355
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started