What kind of vulnerability requires you to have a serial number, device name and the occurring MAC address?
I don't get what kind of vuln this should be. It's totally OK that you can update the IP by using those values; that's how DDNS works mostly.
Device ID is only found on the factory partition of the device itself.
Newer devices contain all the information on the label - but what's the point here? If I upload my credit card details - everyone can use it.
The recent firmware had been added the TLS & HTTP client certificate authentication for the DDNS feature, and we still keep the DDNS server support the unsecure http request in the period of time in order to compatible with old firmware.
If that’s what you meant by “vulnerability”, then it is partially true! I would call it insecure mechanism rather than vulnerability.
You are right if someone leaks his device id and SN then his device info can be used to be registered with an attacker IP. Then the attacker can mimic that victim device’s web admin panel hoping to phish on the victim admin when he logs in.
That’s why you see GL admins on the forum always try to remove logs and screenshot that contain SN and Device ID.
This is a good news ! You can make sure that all newer firmware are released with HTTPS support as well. My Spitz running on the latest firmware still have hardcoded http urls for glddns!
Once you see in the web server logs lesser users using http the I think it is better to turn it offf completely.