{"uuid": "774a9c0b-32fc-499c-9d0a-ca908c5512dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-13893", "type": "seen", "source": "https://t.me/cvedetector/19713", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13893 - Smartwares Cameras Telnet Service Credential Exposure\", \n  \"Content\": \"CVE ID : CVE-2024-13893 \nPublished : March 6, 2025, 2:15 p.m. | 1\u00a0hour, 52\u00a0minutes ago \nDescription : Smartwares cameras\u00a0CIP-37210AT and\u00a0C724IP, as well as others which share the same firmware in versions up to 3.3.0, might share same credentials for telnet service. Hash of the password can be retrieved through physical access to SPI connected memory.  \nFor the telnet service to be enabled, the inserted SD card needs to have a folder with a specific name created.\u00a0  \nTwo products were tested, but since the vendor has not replied to reports, patching status remains unknown, as well as groups of devices and firmware ranges in which the same password is shared.  \n Newer firmware versions might be vulnerable as well. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T17:11:08.000000Z"}