CVE-2020-12733
📋 TL;DR
This vulnerability allows unauthorized TELNET access to certain Shenzhen PENGLIXIN components in DEPSTECH WiFi Digital Microscope 3 devices using default credentials. Attackers can gain administrative control over affected devices, potentially compromising connected systems. Users of DEPSTECH WiFi Digital Microscope 3 and Shekar Endoscope devices are affected.
💻 Affected Systems
- DEPSTECH WiFi Digital Microscope 3
- Shekar Endoscope
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise allowing attackers to install malware, exfiltrate data, pivot to connected networks, or render devices inoperable.
Likely Case
Unauthorized access leading to device configuration changes, data theft from connected systems, or disruption of microscope functionality.
If Mitigated
Limited impact with proper network segmentation and credential management, though default credentials remain a risk.
🎯 Exploit Status
Exploitation requires only TELNET access and knowledge of default credentials (molinkadmin password for molink account).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Contact DEPSTECH support for firmware updates or replacement options.
🔧 Temporary Workarounds
Disable TELNET Service
linuxDisable TELNET service on affected devices to prevent credential-based attacks
telnetd -l /bin/login
Change Default Credentials
linuxChange default molink account password from molinkadmin to a strong unique password
passwd molink
🧯 If You Can't Patch
- Isolate affected devices on separate network segments with strict firewall rules
- Implement network monitoring for TELNET connections to affected devices
🔍 How to Verify
Check if Vulnerable:
Attempt TELNET connection to device on port 23 using credentials: username 'molink', password 'molinkadmin'
Check Version:
Not applicable - vulnerability is in hardware components rather than software version
Verify Fix Applied:
Verify TELNET service is disabled or default credentials no longer work
📡 Detection & Monitoring
Log Indicators:
- Failed/successful TELNET authentication attempts
- Unusual TELNET connections from unknown IPs
Network Indicators:
- TELNET traffic to/from affected devices
- Port 23 connections to microscope devices
SIEM Query:
source_port=23 OR destination_port=23 AND (device_type="microscope" OR device_vendor="DEPSTECH")
🔗 References
- https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Depstech%20Microscope%20Smart%20Kid%20Toy.pdf
- https://www.depstech.com/mw001-s02-wifi-usb-digital-microscope
- https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Depstech%20Microscope%20Smart%20Kid%20Toy.pdf
- https://www.depstech.com/mw001-s02-wifi-usb-digital-microscope