IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1...
Moderate severity
Unreviewed
Published
Oct 7, 2024
to the GitHub Advisory Database
•
Updated Nov 5, 2024
Description
Published by the National Vulnerability Database
Oct 7, 2024
Published to the GitHub Advisory Database
Oct 7, 2024
Last updated
Nov 5, 2024
IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 suffers from Insufficient Session Expiration. The lack of validation of the authentication token at the IoT Haat during the Access Point Pairing mode leads the attacker to replay the Wi-Fi packets and forcefully turn off the access point after the authentication token has expired.
References