SinoTrack GPS Receiver
The SinoTrack IOT PC Platform contains authorization bypass vulnerabilities that allow an attacker to access device profiles without proper credentials through the web management interface. Successful exploitation permits unauthorized access to connected vehicle tracking and remote function capabilities such as real-time location tracking and fuel pump control where supported. The vulnerability exists across all versions of the product and the vendor has not responded to coordination requests or planned remediation.
- Network access to the SinoTrack management interface web portal (typically HTTPS)
- Default or weak credentials if not changed from factory settings
- Knowledge of or ability to enumerate valid device identifiers
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8de30b71-dc92-4f79-b8c2-f313c517179fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.