← Back to CVEs
CVE-2019-15745
N/ADescription
The Eques elf smart plug and the mobile app use a hardcoded AES 256 bit key to encrypt the commands and responses between the device and the app. The communication happens over UDP port 27431. An attacker on the local network can use the same key to encrypt and send commands to discover all smart plugs in a network, take over control of a device, and perform actions such as turning it on and off.
CVE Details
CVSS v3.1 ScoreN/A
Published8/29/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
equeshome:elf_smart_plugequeshome:elf_smart_plug_firmware
Weaknesses (CWE)
CWE-798
References
https://github.com/iamckn/eques(cve@mitre.org)
https://github.com/iamckn/eques(af854a3a-2127-422b-91ae-364da2661108)
https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-four/(af854a3a-2127-422b-91ae-364da2661108)
https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-one/(af854a3a-2127-422b-91ae-364da2661108)
https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-three/(af854a3a-2127-422b-91ae-364da2661108)
https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-two/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.