vendor: https://github.com/adriankumpf/teslamate
download link:https://github.com/adriankumpf/teslamate/releases
Vulnerability trigger parameter:&url
The process of vulnerability discovery is as follows:
Access link:https://fofa.info/ and search: title="teslamate"
for example:http://leegt.synology.me:4000/
You can get the information of the vehicle
If the background uses the default passage
like:http://leegt.synology.me:3000/
username:admin password:admin
Hackers can further access the sensitive information of the vehicle