Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
[
{
"cpes": [
"cpe:2.3:o:flient:smart_lock_advanced_firmware:1.0:*:*:*:*:*:*:*"
],
"vendor": "flient",
"product": "smart_lock_advanced_firmware",
"versions": [
{
"status": "affected",
"version": "1.0"
}
],
"defaultStatus": "unknown"
}
]