Show filters
162 Total Results
Displaying 61-70 of 162
Sort by:
Attacker Value
Unknown
CVE-2016-2360
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.
0
Attacker Value
Unknown
CVE-2016-2359
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
0
Attacker Value
Unknown
CVE-2016-2358
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.
0
Attacker Value
Unknown
CVE-2016-2357
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.
0
Attacker Value
Unknown
CVE-2016-2356
Disclosure Date: October 25, 2019 (last updated November 27, 2024)
Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.
0
Attacker Value
Unknown
CVE-2019-12920
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
On Shenzhen Cylan Clever Dog Smart Camera DOG-2W and DOG-2W-V4 devices, an attacker on the network can login remotely to the camera and gain root access. The device ships with a hardcoded 12345678 password for the root account, accessible from a TELNET login prompt.
0
Attacker Value
Unknown
CVE-2019-12919
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
On Shenzhen Cylan Clever Dog Smart Camera DOG-2W and DOG-2W-V4 devices, an attacker on the local network has unauthenticated access to the internal SD card via the HTTP service on port 8000. The HTTP web server on the camera allows anyone to view or download the video archive recorded and saved on the external memory card attached to the device.
0
Attacker Value
Unknown
CVE-2017-10723
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that an attacker connected to the device Wi-Fi SSID can exploit a memory corruption issue and execute remote code on the device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries. The firmware contains binary uvc_stream that is the UDP daemon which is responsible for handling all the UDP requests that the device receives. The client application sends a UDP request to change the Wi-Fi name which contains the following format: "SETCMD0001+0001+[2 by…
0
Attacker Value
Unknown
CVE-2017-10721
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has Telnet functionality enabled by default. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.
0
Attacker Value
Unknown
CVE-2017-10718
Disclosure Date: June 17, 2019 (last updated November 27, 2024)
Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that any malicious user connecting to the device can change the default SSID and password thereby denying the owner an access to his/her own device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.
0