The MiCODUS MV720 GPS tracker API server has an authentication mechanism that allows devices to use a hard-coded master password. This may allow an attacker to send SMS commands directly to the GPS tracker as if they were coming from the GPS ownerβs mobile number.
9.8CVSS
9.6AI Score
0.002EPSS
SMS-based GPS commands can be executed by MiCODUS MV720 GPS tracker without authentication.
9.8CVSS
9.5AI Score
0.002EPSS
The main MiCODUS MV720 GPS tracker web server has a reflected cross-site scripting vulnerability that could allow an attacker to gain control by tricking a user into making a request.
7.5CVSS
6.1AI Score
0.001EPSS
The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object references vulnerability on endpoint and POST parameter βDevice ID,β which accepts arbitrary device IDs.
6.5CVSS
7.1AI Score
0.001EPSS
The main MiCODUS MV720 GPS tracker web server has an authenticated insecure direct object reference vulnerability on endpoint and parameter device IDs, which accept arbitrary device IDs without further verification.
7.1CVSS
6.5AI Score
0.001EPSS