The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcoded AES encryption keys that can be extracted from a binary file. Thus, encryption can be defeated by an attacker who can observe packet data (e.g., over Wi-Fi).
No PoCs from references.
- https://github.com/actuator/com.cn.dq.ipc
- https://github.com/actuator/cve
- https://github.com/nomi-sec/PoC-in-GitHub