Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2018-17879
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
An issue was discovered on certain ABUS TVIP cameras. The CGI scripts allow remote attackers to execute code via system() as root. There are several injection points in various scripts.
0
Attacker Value
Unknown
CVE-2018-17878
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
Buffer Overflow vulnerability in certain ABUS TVIP cameras allows attackers to gain control of the program via crafted string sent to sprintf() function.
0
Attacker Value
Unknown
CVE-2018-17559
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
Due to incorrect access control, unauthenticated remote attackers can view the /video.mjpg video stream of certain ABUS TVIP cameras.
0
Attacker Value
Unknown
CVE-2018-17558
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root.
0
Attacker Value
Unknown
CVE-2018-16739
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
An issue was discovered on certain ABUS TVIP devices. Due to a path traversal in /opt/cgi/admin/filewrite, an attacker can write to files, and thus execute code arbitrarily with root privileges.
0
Attacker Value
Unknown
CVE-2023-26609
Disclosure Date: February 27, 2023 (last updated October 08, 2023)
ABUS TVIP 20000-21150 devices allows remote attackers to execute arbitrary code via shell metacharacters in the /cgi-bin/mft/wireless_mft ap field.
0