Vulnerabilites related to FNKvision - FNK-GU2
CVE-2025-7215 (GCVE-0-2025-7215)
Vulnerability from cvelistv5
Published
2025-07-09 04:02
Modified
2025-07-09 14:17
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability, which was classified as problematic, has been found in FNKvision FNK-GU2 up to 40.1.7. Affected by this issue is some unknown functionality of the file /rom/wpa_supplicant.conf. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7215", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-09T14:17:23.684726Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-09T14:17:36.350Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FNK-GU2", "vendor": "FNKvision", "versions": [ { "status": "affected", "version": "40.1.0" }, { "status": "affected", "version": "40.1.1" }, { "status": "affected", "version": "40.1.2" }, { "status": "affected", "version": "40.1.3" }, { "status": "affected", "version": "40.1.4" }, { "status": "affected", "version": "40.1.5" }, { "status": "affected", "version": "40.1.6" }, { "status": "affected", "version": "40.1.7" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "0xHasta (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in FNKvision FNK-GU2 up to 40.1.7. Affected by this issue is some unknown functionality of the file /rom/wpa_supplicant.conf. The manipulation leads to cleartext storage of sensitive information. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in FNKvision FNK-GU2 bis 40.1.7 entdeckt. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /rom/wpa_supplicant.conf. Durch die Manipulation mit unbekannten Daten kann eine cleartext storage of sensitive information-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 1, "baseSeverity": "LOW", "vectorString": "CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 1.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 1.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 0.8, "vectorString": "AV:L/AC:H/Au:M/C:P/I:N/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-310", "description": "Cryptographic Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-09T04:02:05.353Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-315164 | FNKvision FNK-GU2 wpa_supplicant.conf cleartext storage", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.315164" }, { "name": "VDB-315164 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.315164" }, { "name": "Submit #608030 | FNKvision FNK-GU2 Wireless IP Camera Firmware version 40.1.7 and prior Clear-text Storage of Sensitive Information (CWE-312)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.608030" }, { "tags": [ "exploit" ], "url": "https://medium.com/@pundhapat/sqli-in-the-cloud-root-on-the-board-a-beginners-journey-into-iot-hacking-06efb2539a21" } ], "timeline": [ { "lang": "en", "time": "2025-07-07T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-07-07T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-07-07T15:24:29.000Z", "value": "VulDB entry last update" } ], "title": "FNKvision FNK-GU2 wpa_supplicant.conf cleartext storage" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-7215", "datePublished": "2025-07-09T04:02:05.353Z", "dateReserved": "2025-07-07T13:19:21.130Z", "dateUpdated": "2025-07-09T14:17:36.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-7214 (GCVE-0-2025-7214)
Vulnerability from cvelistv5
Published
2025-07-09 03:32
Modified
2025-07-09 14:28
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability classified as problematic was found in FNKvision FNK-GU2 up to 40.1.7. Affected by this vulnerability is an unknown functionality of the file /etc/shadow of the component MD5. The manipulation leads to risky cryptographic algorithm. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7214", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-09T14:28:03.560920Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-09T14:28:15.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "MD5" ], "product": "FNK-GU2", "vendor": "FNKvision", "versions": [ { "status": "affected", "version": "40.1.0" }, { "status": "affected", "version": "40.1.1" }, { "status": "affected", "version": "40.1.2" }, { "status": "affected", "version": "40.1.3" }, { "status": "affected", "version": "40.1.4" }, { "status": "affected", "version": "40.1.5" }, { "status": "affected", "version": "40.1.6" }, { "status": "affected", "version": "40.1.7" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "0xHasta (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in FNKvision FNK-GU2 up to 40.1.7. Affected by this vulnerability is an unknown functionality of the file /etc/shadow of the component MD5. The manipulation leads to risky cryptographic algorithm. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "In FNKvision FNK-GU2 bis 40.1.7 wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /etc/shadow der Komponente MD5. Mit der Manipulation mit unbekannten Daten kann eine risky cryptographic algorithm-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig ausnutzbar. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 1, "baseSeverity": "LOW", "vectorString": "CVSS:4.0/AV:P/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 1.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 1.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 0.8, "vectorString": "AV:L/AC:H/Au:M/C:P/I:N/A:N/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-327", "description": "Risky Cryptographic Algorithm", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-310", "description": "Cryptographic Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-09T03:32:05.801Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-315163 | FNKvision FNK-GU2 MD5 shadow risky encryption", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.315163" }, { "name": "VDB-315163 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.315163" }, { "name": "Submit #608027 | FNKvision FNK-GU2 Wireless IP Camera Firmware version 40.1.7 and prior Use of a Broken or Risky Cryptographic Algorithm (CWE-327)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.608027" }, { "tags": [ "exploit" ], "url": "https://medium.com/@pundhapat/sqli-in-the-cloud-root-on-the-board-a-beginners-journey-into-iot-hacking-06efb2539a21" } ], "timeline": [ { "lang": "en", "time": "2025-07-07T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-07-07T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-07-07T15:24:27.000Z", "value": "VulDB entry last update" } ], "title": "FNKvision FNK-GU2 MD5 shadow risky encryption" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-7214", "datePublished": "2025-07-09T03:32:05.801Z", "dateReserved": "2025-07-07T13:19:18.431Z", "dateUpdated": "2025-07-09T14:28:15.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-7213 (GCVE-0-2025-7213)
Vulnerability from cvelistv5
Published
2025-07-09 03:02
Modified
2025-07-09 17:28
Severity ?
4.5 (Medium) - CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
6.4 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.4 (Medium) - CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.4 (Medium) - CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
6.4 (Medium) - CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R
VLAI Severity ?
EPSS score ?
CWE
- CWE-1191 - On-Chip Debug and Test Interface With Improper Access Control
Summary
A vulnerability classified as critical has been found in FNKvision FNK-GU2 up to 40.1.7. Affected is an unknown function of the component UART Interface. The manipulation leads to on-chip debug and test interface with improper access control. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-7213", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-09T17:27:32.987870Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-09T17:28:36.758Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "UART Interface" ], "product": "FNK-GU2", "vendor": "FNKvision", "versions": [ { "status": "affected", "version": "40.1.0" }, { "status": "affected", "version": "40.1.1" }, { "status": "affected", "version": "40.1.2" }, { "status": "affected", "version": "40.1.3" }, { "status": "affected", "version": "40.1.4" }, { "status": "affected", "version": "40.1.5" }, { "status": "affected", "version": "40.1.6" }, { "status": "affected", "version": "40.1.7" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "0xHasta (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in FNKvision FNK-GU2 up to 40.1.7. Affected is an unknown function of the component UART Interface. The manipulation leads to on-chip debug and test interface with improper access control. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Es wurde eine kritische Schwachstelle in FNKvision FNK-GU2 bis 40.1.7 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Komponente UART Interface. Dank Manipulation mit unbekannten Daten kann eine on-chip debug and test interface with improper access control-Schwachstelle ausgenutzt werden. Ein Angriff setzt physischen Zugriff auf dem Zielobjekt voraus. Die Komplexit\u00e4t eines Angriffs ist eher hoch. Sie gilt als schwierig auszunutzen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.2, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1191", "description": "On-Chip Debug and Test Interface With Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-09T03:02:05.807Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-315162 | FNKvision FNK-GU2 UART Interface on-chip debug and test interface with improper access control", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.315162" }, { "name": "VDB-315162 | CTI Indicators (IOB, IOC)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.315162" }, { "name": "Submit #608025 | FNKvision FNK-GU2 Wireless IP Camera Firmware version 40.1.7 and prior On-Chip Debug and Test Interface With Improper Access Control (C", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.608025" }, { "tags": [ "exploit" ], "url": "https://medium.com/@pundhapat/sqli-in-the-cloud-root-on-the-board-a-beginners-journey-into-iot-hacking-06efb2539a21" } ], "timeline": [ { "lang": "en", "time": "2025-07-07T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-07-07T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-07-07T15:24:26.000Z", "value": "VulDB entry last update" } ], "title": "FNKvision FNK-GU2 UART Interface on-chip debug and test interface with improper access control" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-7213", "datePublished": "2025-07-09T03:02:05.807Z", "dateReserved": "2025-07-07T13:19:13.819Z", "dateUpdated": "2025-07-09T17:28:36.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }