Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2017-18377
Disclosure Date: June 11, 2019 (last updated November 27, 2024)
An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
0
Attacker Value
Unknown
CVE-2017-11634
Disclosure Date: February 26, 2018 (last updated November 26, 2024)
An issue was discovered on Wireless IP Camera 360 devices. Remote attackers can discover a weakly encoded admin password by connecting to TCP port 9527 and reading the password field of the debugging information, e.g., nTBCS19C corresponds to a password of 123456.
0
Attacker Value
Unknown
CVE-2017-11633
Disclosure Date: February 26, 2018 (last updated November 26, 2024)
An issue was discovered on Wireless IP Camera 360 devices. Remote attackers can discover RTSP credentials by connecting to TCP port 9527 and reading the InsertConnect field.
0
Attacker Value
Unknown
CVE-2017-11632
Disclosure Date: February 26, 2018 (last updated November 26, 2024)
An issue was discovered on Wireless IP Camera 360 devices. A root account with a known SHA-512 password hash exists, which makes it easier for remote attackers to obtain administrative access via a TELNET session.
0
Attacker Value
Unknown
CVE-2017-11635
Disclosure Date: February 26, 2018 (last updated November 26, 2024)
An issue was discovered on Wireless IP Camera 360 devices. Attackers can read recordings by navigating to /mnt/idea0 or /mnt/idea1 on the SD memory card.
0
Attacker Value
Unknown
CVE-2017-8224
Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account that can be accessed with TELNET.
0
Attacker Value
Unknown
CVE-2017-8225
Disclosure Date: April 25, 2017 (last updated November 26, 2024)
On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (containing credentials) is not correctly checked. An attacker can bypass authentication by providing an empty loginuse parameter and an empty loginpas parameter in the URI.
0
Attacker Value
Unknown
CVE-2017-8221
Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown
CVE-2017-8222
Disclosure Date: April 25, 2017 (last updated November 26, 2024)
Wireless IP Camera (P2P) WIFICAM devices have an "Apple Production IOS Push Services" private RSA key and certificate stored in /system/www/pem/ck.pem inside the firmware, which allows attackers to obtain sensitive information.
0
Attacker Value
Unknown
CVE-2017-8223
Disclosure Date: April 25, 2017 (last updated November 26, 2024)
On Wireless IP Camera (P2P) WIFICAM devices, an attacker can use the RTSP server on port 10554/tcp to watch the streaming without authentication via tcp/av0_1 or tcp/av0_0.
0