Browse all 5 CVE security advisories affecting MiCODUS. AI-powered Chinese analysis, POCs, and references for each vulnerability.
MiCODUS develops remote management solutions for IP video surveillance systems, primarily serving security and surveillance applications. Historically, their products have been vulnerable to multiple remote code execution flaws, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and authentication bypasses. The company gained significant attention in 2022 when researchers discovered critical vulnerabilities affecting over 150,000 devices worldwide, allowing unauthorized access and control. These issues highlight systemic security weaknesses in their firmware design and update mechanisms, with multiple CVEs documenting similar patterns of insecure implementation across their product lines.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-2107 | ICSA-22-200-01 MiCODUS MV720 GPS tracker Use of Hard-coded Credentials — MV720CWE-798 | 9.8 | Critical | 2022-07-20 |
| CVE-2022-33944 | ICSA-22-200-01 MiCODUS MV720 GPS tracker Authorization Bypass Through User-Controlled Key — MV720CWE-639 | 6.5 | Medium | 2022-07-20 |
| CVE-2022-2141 | ICSA-22-200-01 MiCODUS MV720 GPS tracker Improper Authentication — MV720CWE-287 | 9.8 | Critical | 2022-07-20 |
| CVE-2022-2199 | ICSA-22-200-01 MiCODUS MV720 GPS tracker Cross-site Scripting — MV720CWE-79 | 7.5 | High | 2022-07-20 |
| CVE-2022-34150 | ICSA-22-200-01 MiCODUS MV720 GPS tracker Authorization Bypass Through User-Controlled Key — MV720CWE-639 | 7.1 | High | 2022-07-20 |
This page lists every published CVE security advisory associated with MiCODUS. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.