Browse all 5 CVE security advisories affecting i-Drive. AI-powered Chinese analysis, POCs, and references for each vulnerability.
i-Drive is a cloud storage and file synchronization platform enabling secure data access across devices. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by its five recorded CVEs. The platform's security characteristics include client-side data encryption and multi-factor authentication, though past incidents have exposed weaknesses in authentication mechanisms and input validation. These vulnerabilities have potentially allowed unauthorized access to user files and system compromise, highlighting the need for rigorous patch management and security hardening practices for enterprise deployments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-1882 | i-Drive i11/i12 Device Setting improper access control for register interface — i11CWE-1262 | 5.0 | Medium | 2025-03-03 |
| CVE-2025-1881 | i-Drive i11/i12 Video Footage/Live Video Stream access control — i11CWE-284 | 4.3 | Medium | 2025-03-03 |
| CVE-2025-1880 | i-Drive i11/i12 Device Pairing authentication bypass — i11CWE-305 | 2.0 | Low | 2025-03-03 |
| CVE-2025-1879 | i-Drive i11/i12 APK hard-coded credentials — i11CWE-798 | 2.4 | Low | 2025-03-03 |
| CVE-2025-1878 | i-Drive i11/i12 WiFi default password — i11CWE-1393 | 3.1 | Low | 2025-03-03 |
This page lists every published CVE security advisory associated with i-Drive. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.