Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://hacked.camera/ |
![]() ![]() |
https://redprocyon.com |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:34:38.216Z
Reserved: 2020-03-01T00:00:00
Link: CVE-2020-9529

No data.

Status : Modified
Published: 2020-08-10T16:15:12.410
Modified: 2024-11-21T05:40:48.803
Link: CVE-2020-9529

No data.