An exploitable vulnerability exists in the Wi-Fi Access Point feature of the Roav A1 Dashcam running version RoavA1SWV1.9. A set of default credentials can potentially be used to connect to the device. An attacker can connect to the AP to trigger this vulnerability.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0688 | third party advisory |