Show filters
274 Total Results
Displaying 1-10 of 274
Sort by:
Attacker Value
Unknown

CVE-2023-32220

Disclosure Date: June 08, 2023 (last updated October 08, 2023)
Milesight NCR/camera version 71.8.0.6-r5 allows authentication bypass through an unspecified method.
Attacker Value
Unknown

CVE-2023-28704

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service.
Attacker Value
Low

CVE-2020-3110 (AKA: CDPwn)

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
A vulnerability in the Cisco Discovery Protocol implementation for the Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute code remotely or cause a reload of an affected IP Camera. The vulnerability is due to missing checks when processing Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to the targeted IP Camera. A successful exploit could allow the attacker to expose the affected IP Camera for remote code execution or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). This vulnerability is fixed in Video Surveillance 8000 Series IP Camera Firmware Release 1.0.7 and later.
Attacker Value
Unknown

CVE-2019-13953

Disclosure Date: September 06, 2019 (last updated November 27, 2024)
An exploitable authentication bypass vulnerability exists in the Bluetooth Low Energy (BLE) authentication module of YI M1 Mirrorless Camera V3.2-cn. An attacker can send a set of BLE commands to trigger this vulnerability, resulting in sensitive data leakage (e.g., personal photos). An attacker can also control the camera to record or take a picture after bypassing authentication.
1
Attacker Value
Unknown

CVE-2025-1338

Disclosure Date: February 16, 2025 (last updated February 16, 2025)
A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2025-1099

Disclosure Date: February 10, 2025 (last updated February 14, 2025)
This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.
0
Attacker Value
Unknown

CVE-2024-7696

Disclosure Date: January 07, 2025 (last updated January 07, 2025)
Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for an authenticated malicious client to tamper with audit log creation in AXIS Camera Station, or perform a Denial-of-Service attack on the AXIS Camera Station server using maliciously crafted audit log entries. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
0
Attacker Value
Unknown

CVE-2024-52548

Disclosure Date: December 03, 2024 (last updated December 21, 2024)
An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
0
Attacker Value
Unknown

CVE-2024-52547

Disclosure Date: December 03, 2024 (last updated December 21, 2024)
An authenticated attacker can trigger a stack based buffer overflow in the DHIP Service (TCP port 80). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
0
Attacker Value
Unknown

CVE-2024-52546

Disclosure Date: December 03, 2024 (last updated December 21, 2024)
An unauthenticated attacker can perform a null pointer dereference in the DHIP Service (UDP port 37810). This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
0