Show filters
54 Total Results
Displaying 41-50 of 54
Sort by:
Attacker Value
Unknown

CVE-2017-16566

Disclosure Date: November 17, 2017 (last updated November 26, 2024)
On Jooan IP Camera A5 2.3.36 devices, an insecure FTP server does not require authentication, which allows remote attackers to read or replace core system files including those used for authentication (such as passwd and shadow). This can be abused to take full root level control of the device.
Attacker Value
Unknown

CVE-2017-15236

Disclosure Date: October 11, 2017 (last updated November 26, 2024)
Tiandy IP cameras 5.56.17.120 do not properly restrict a certain proprietary protocol, which allows remote attackers to read settings via a crafted request to TCP port 3001, as demonstrated by config* files and extendword.txt.
0
Attacker Value
Unknown

CVE-2017-5173

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
An Improper Neutralization of Special Elements (in an OS command) issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An improper neutralization of special elements vulnerability has been identified. If special elements are not properly neutralized, an attacker can call multiple parameters that can allow access to the root level operating system which could allow remote code execution.
Attacker Value
Unknown

CVE-2017-5174

Disclosure Date: May 19, 2017 (last updated November 26, 2024)
An Authentication Bypass issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution.
0
Attacker Value
Unknown

CVE-2017-8224

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.
0
Attacker Value
Unknown

CVE-2017-8225

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
0
Attacker Value
Unknown

CVE-2017-8221

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown

CVE-2017-8222

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
0
Attacker Value
Unknown

CVE-2017-8223

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.
0
Attacker Value
Unknown

CVE-2017-7253

Disclosure Date: March 30, 2017 (last updated November 26, 2024)
Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.
0