Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44518

EPSS 0.06% · P19
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-44518

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the eGeeTouch 3rd Generation Travel Padlock application for Android. The lock sends a pairing code before each operation (lock or unlock) activated via the companion app. The code is sent unencrypted, allowing any attacker with the same app (either Android or iOS) to add the lock and take complete control. For successful exploitation, the attacker must be able to touch the lock's power button, and must be able to capture BLE network communication.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
eGeeTouch 3rd Generation Travel Padlock application 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
eGeeTouch 3rd Generation Travel Padlock application是eGeeTouch公司的一款智能箱包锁,提供旅行箱包简单而更强化的安全性,以满足日益增加且遍及全球的旅行者的旅游体验。 eGeeTouch 3rd Generation Travel Padlock application 存在安全漏洞,该漏洞源于锁在通过伴生应用激活每次操作(锁或解锁)之前发送一个配对代码。该代码不加密发送,允许使用同一应用(无论是Android还是iOS)的任何攻击者可利用该漏洞添加
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-44518

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-44518

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-12-02 · 24 CVEs total

CVE-2021-43681SakuraPanel 跨站脚本漏洞
CVE-2020-36135Aom 代码问题漏洞
CVE-2020-36134Aom 缓冲区错误漏洞
CVE-2020-36133AOM 安全漏洞
CVE-2020-36131Aom 缓冲区错误漏洞
CVE-2020-36130Aom 代码问题漏洞
CVE-2020-36129Aom 缓冲区错误漏洞
CVE-2021-44227GNU Mailman 跨站请求伪造漏洞
CVE-2020-27414Maharashtra State Electricity Distribution Maharashtra State Electricity Board Android App
CVE-2021-26777Circutor Compact Dc-S Basic Smart Metering Concentrator 缓冲区错误漏洞
CVE-2021-43686Nzedb 跨站脚本漏洞
CVE-2021-43683Haschek Solutions Pictshare 跨站脚本漏洞
CVE-2021-25785Taocms 跨站脚本漏洞
CVE-2021-43682Thinkphp-Bjyblog 跨站脚本漏洞
CVE-2021-43679ECShop SQL注入漏洞
CVE-2021-44050Broadcom CA Network Flow Analysis SQL注入漏洞
CVE-2021-43327Renesas Electronics Renesas RX65和RX65N 安全漏洞
CVE-2021-28236Libredwg 代码问题漏洞
CVE-2021-28237Libredwg 缓冲区错误漏洞
CVE-2020-29176Z-BlogPHP 代码问题漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-44518

No comments yet


Leave a comment