In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update.
The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.
Name | Vendor | Start Version | End Version |
---|---|---|---|
I-onenet | Hunesion | 3.0.7 (including) | 3.0.53 (including) |
I-onenet | Hunesion | 4.0.4 (including) | 4.0.16 (including) |