The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
References
| Link | Resource |
|---|---|
| https://github.com/actuator/com.cn.dq.ipc | Third Party Advisory |
| https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 | Third Party Advisory |
| https://github.com/actuator/com.cn.dq.ipc | Third Party Advisory |
| https://github.com/actuator/com.cn.dq.ipc/blob/main/CVE-2024-25731 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-03-05 00:15
Updated : 2025-03-26 20:15
NVD link : CVE-2024-25731
Mitre link : CVE-2024-25731
CVE.ORG link : CVE-2024-25731
JSON object : View
Products Affected
elinksmart
- esmartcam
CWE
CWE-798
Use of Hard-coded Credentials
