This vulnerability exists in Airveda Air Quality Monitor...
High severity
Unreviewed
Published
Aug 12, 2024
to the GitHub Advisory Database
•
Updated Aug 13, 2024
Description
Published by the National Vulnerability Database
Aug 12, 2024
Published to the GitHub Advisory Database
Aug 12, 2024
Last updated
Aug 13, 2024
This vulnerability exists in Airveda Air Quality Monitor PM2.5 PM10 due to transmission of sensitive information in plain text during AP pairing mode. An attacker in close proximity could exploit this vulnerability by capturing Wi-Fi traffic of Airveda-AP.
Successful exploitation of this vulnerability could allow the attacker to cause Evil Twin attack on the targeted system.
References