CVE-2023-46892

8.8HIGH

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unau

Veröffentlicht: 1/23/2024Aktualisiert: 6/17/2025

Beschreibung

The radio frequency communication protocol being used by Meross MSH30Q 4.5.23 is vulnerable to replay attacks, allowing attackers to record and replay previously captured communication to execute unauthorized commands or actions (e.g., thermostat's temperature).

KI-AnalyseKI-gestützt

Betroffene Produkte

merossmsh30q_firmware
4.5.23
merossmsh30q
-

Referenzen