A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the Wi-Fi network. (Access to live video from the app also becomes unavailable.)
References
Link | Resource |
---|---|
https://github.com/Jacquais/BlinkVuln | Exploit Third Party Advisory |
https://github.com/Jacquais/BlinkVuln | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Jacquais/BlinkVuln - Exploit, Third Party Advisory |
Information
Published : 2018-12-15 06:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20161
Mitre link : CVE-2018-20161
CVE.ORG link : CVE-2018-20161
JSON object : View
Products Affected
blinkforhome
- sync_module
CWE