Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12702

EPSS 0.43% · P63
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-12702

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Weak encryption in the Quick Pairing mode in the eWeLink mobile application (Android application V4.9.2 and earlier, iOS application V4.9.1 and earlier) allows physically proximate attackers to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the Wi-Fi spectrum during the pairing process.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
eWeLink mobile application 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
IFTTT eWeLink是 IFTTT开源的一个应用软件。提供远程开关风扇和灯、控制风速和调灯光。 eWeLink mobile application 存在安全漏洞,该漏洞源于快速配对模式下的弱加密,在配对过程中,攻击者可利用该漏洞窃听Wi-Fi凭证等敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-12702

#POC DescriptionSource LinkShenlong Link
1eWeLinkESPT is a tool that automatically decodes and decrypts the WiFi network credentials transmitted to a supported ESP-based IoT device by the eWeLink mobile application. (CVE-2020-12702)https://github.com/salgio/ESPTouchCatcherPOC Details
2This repo describes a vulnerability affecting the QR code based pairing process of the eWeLink IoT devices (CVE-2020-12702).https://github.com/salgio/eWeLink-QR-CodePOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-12702

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-02-24 · 10 CVEs total

CVE-2020-11987Apache Batik 代码问题漏洞
CVE-2021-27645GNU C Library和glibc 资源管理错误漏洞
CVE-2021-3355LightCMS v跨站脚本漏洞
CVE-2020-28599Torsten Paul Openscad 缓冲区错误漏洞
CVE-2021-22667Advantech BB-ESWGP506-2SFP-T 信任管理问题漏洞
CVE-2021-21973VMware vCenter Server 代码问题漏洞
CVE-2021-21972VMware vSphere Client 路径遍历漏洞
CVE-2021-21974威睿 VMware ESXi 缓冲区错误漏洞
CVE-2020-11988Apache XmlGraphics Commons 代码问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-12702

No comments yet


Leave a comment