The radio frequency communication protocol being used by...
High severity
Unreviewed
Published
Jan 23, 2024
to the GitHub Advisory Database
•
Updated Feb 7, 2024
Description
Published by the National Vulnerability Database
Jan 23, 2024
Published to the GitHub Advisory Database
Jan 23, 2024
Last updated
Feb 7, 2024
The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).
References