Philips In.Sight B120/37 has a password of b120root for the backdoor root account, a password of /ADMIN/ for the backdoor admin account, a password of merlin for the backdoor mg3500 account, a password of M100-4674448 for the backdoor user account, and a password of M100-4674448 for the backdoor admin account.
References
Link | Resource |
---|---|
https://community.rapid7.com/community/infosec/blog/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video-baby-monitors | Exploit Third Party Advisory |
https://community.rapid7.com/community/infosec/blog/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video-baby-monitors | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.rapid7.com/community/infosec/blog/2015/09/02/iotsec-disclosure-10-new-vulns-for-several-video-baby-monitors - Exploit, Third Party Advisory |
Information
Published : 2017-04-10 03:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2882
Mitre link : CVE-2015-2882
CVE.ORG link : CVE-2015-2882
JSON object : View
Products Affected
philips
- in.sight_b120\\37
CWE
CWE-798
Use of Hard-coded Credentials