Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-23041 | The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi). |
Wed, 26 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 26 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elinksmart
Elinksmart esmartcam |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:a:elinksmart:esmartcam:2.1.5:*:*:*:*:android:*:* | |
| Vendors & Products |
Elinksmart
Elinksmart esmartcam |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-26T20:08:09.570Z
Reserved: 2024-02-11T00:00:00.000Z
Link: CVE-2024-25731
Updated: 2024-08-01T23:52:05.442Z
Status : Modified
Published: 2024-03-05T00:15:52.457
Modified: 2025-03-26T20:15:19.587
Link: CVE-2024-25731
No data.
OpenCVE Enrichment
No data.
EUVD