Loading
Generated remediation guidance and an executive summary. No account required.
An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
Use CWE-798, Eyesofnetwork vendor hub and Eyesofnetwork product page to widen CVE-2020-8657 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-41572, CVE-2022-41571 and CVE-2022-41570 for nearby disclosures in the same product family.