CVE-2015-8286

Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000.
Configurations

Configuration 1 (hide)

cpe:2.3:o:zhuhai:raysharp_firmware:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:38

Type Values Removed Values Added
References () http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html - Exploit () http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html - Exploit
References () http://seclists.org/bugtraq/2015/Jun/117 - Exploit () http://seclists.org/bugtraq/2015/Jun/117 - Exploit
References () http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/ - () http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/ -
References () http://www.kb.cert.org/vuls/id/899080 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/899080 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/923388 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/923388 - Third Party Advisory, US Government Resource
References () https://community.rapid7.com/community/metasploit/blog/2013/01/23/ray-sharp-cctv-dvr-password-retrieval-remote-root - () https://community.rapid7.com/community/metasploit/blog/2013/01/23/ray-sharp-cctv-dvr-password-retrieval-remote-root -

Information

Published : 2016-02-18 05:59

Updated : 2024-11-21 02:38


NVD link : CVE-2015-8286

Mitre link : CVE-2015-8286

CVE.ORG link : CVE-2015-8286


JSON object : View

Products Affected

zhuhai

  • raysharp_firmware
CWE
CWE-254

7PK - Security Features