Vulnerabilities > Micodus
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-07-20 | CVE-2022-2107 | Use of Hard-coded Credentials vulnerability in Micodus Mv720 Firmware The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. | 9.8 |
2022-07-20 | CVE-2022-2141 | Missing Authentication for Critical Function vulnerability in Micodus Mv720 Firmware SMS-based GPS commands can be executed by MiCODUS MV720 GPS tracker without authentication. | 9.8 |
2022-07-20 | CVE-2022-2199 | Cross-site Scripting vulnerability in Micodus Mv720 Firmware The main MiCODUS MV720 GPS tracker web server has a reflected cross-site scripting vulnerability that could allow an attacker to gain control by tricking a user into making a request. | 6.1 |
2022-07-20 | CVE-2022-33944 | Authorization Bypass Through User-Controlled Key vulnerability in Micodus Mv720 Firmware The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object references vulnerability on endpoint and POST parameter “Device ID,” which accepts arbitrary device IDs. | 6.5 |
2022-07-20 | CVE-2022-34150 | Authorization Bypass Through User-Controlled Key vulnerability in Micodus Mv720 Firmware The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification. | 5.4 |