Vulnerability Details CVE-2020-21995
Inim Electronics Smartliving SmartLAN/G/SI <=6.x uses default hardcoded credentials. An attacker could exploit this to gain Telnet, SSH and FTP access to the system.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 70.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2020-21995
-
cpe:2.3:h:inim:smartliving_10100l:-
-
cpe:2.3:h:inim:smartliving_10100lg3:-
-
cpe:2.3:h:inim:smartliving_1050:-
-
cpe:2.3:h:inim:smartliving_1050g3:-
-
cpe:2.3:h:inim:smartliving_505:-
-
cpe:2.3:h:inim:smartliving_515:-
-
cpe:2.3:o:inim:smartliving_10100l_firmware:-
-
cpe:2.3:o:inim:smartliving_10100l_firmware:6.0
-
cpe:2.3:o:inim:smartliving_10100lg3_firmware:-
-
cpe:2.3:o:inim:smartliving_10100lg3_firmware:6.0
-
cpe:2.3:o:inim:smartliving_1050_firmware:-
-
cpe:2.3:o:inim:smartliving_1050_firmware:6.0
-
cpe:2.3:o:inim:smartliving_1050g3_firmware:-
-
cpe:2.3:o:inim:smartliving_1050g3_firmware:6.0
-
cpe:2.3:o:inim:smartliving_505_firmware:-
-
cpe:2.3:o:inim:smartliving_505_firmware:6.0
-
cpe:2.3:o:inim:smartliving_515_firmware:-
-
cpe:2.3:o:inim:smartliving_515_firmware:6.0