Multiple cross-site request forgery (CSRF) vulnerabilities in the Loftek Nexus 543 IP Camera allow remote attackers to hijack the authentication of unspecified victims for requests that change (1) passwords or (2) firewall configuration, as demonstrated by a request to set_users.cgi.
References
Link | Resource |
---|---|
http://www.tripwire.com/state-of-security/vulnerability-management/vulnerability-who-is-watching-your-ip-camera | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/27878 | Exploit Third Party Advisory VDB Entry |
http://www.tripwire.com/state-of-security/vulnerability-management/vulnerability-who-is-watching-your-ip-camera | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/27878 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tripwire.com/state-of-security/vulnerability-management/vulnerability-who-is-watching-your-ip-camera - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/27878 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-11-21 20:15
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3312
Mitre link : CVE-2013-3312
CVE.ORG link : CVE-2013-3312
JSON object : View
Products Affected
loftek
- nexus_543
- nexus_543_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)