Show filters
54 Total Results
Displaying 31-40 of 54
Sort by:
Attacker Value
Unknown

CVE-2018-12668

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices have a Hard-coded Password.
0
Attacker Value
Unknown

CVE-2018-12670

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices allow OS Command Injection.
0
Attacker Value
Unknown

CVE-2018-12673

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
An attacker with remote access to the SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) web interface can disclose information about the camera including camera hardware, wireless network, and local area network information.
0
Attacker Value
Unknown

CVE-2018-12672

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B) does not perform proper validation on user-supplied input and is vulnerable to cross-site scripting attacks. If proper authorization was implemented, this vulnerability could be leveraged to perform actions on behalf of another user or the administrator.
0
Attacker Value
Unknown

CVE-2018-12675

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) does not perform origin checks on URLs that the camera's web interface redirects a user to. This can be leveraged to send a user to an unexpected endpoint.
0
Attacker Value
Unknown

CVE-2018-11653

Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password.
Attacker Value
Unknown

CVE-2018-11654

Disclosure Date: August 24, 2018 (last updated November 27, 2024)
Information disclosure in Netwave IP camera at get_status.cgi (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information from the device.
Attacker Value
Unknown

Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.2017…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.
0
Attacker Value
Unknown

CVE-2018-6479

Disclosure Date: January 31, 2018 (last updated November 26, 2024)
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
Attacker Value
Unknown

CVE-2017-17761

Disclosure Date: December 19, 2017 (last updated November 26, 2024)
An issue was discovered on Ichano AtHome IP Camera devices. The device runs the "noodles" binary - a service on port 1300 that allows a remote (LAN) unauthenticated user to run arbitrary commands. This binary requires the "system" XML element for specifying the command. For example, a <system>id</system> command results in a <system_ack>ok</system_ack> response.
0