Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000.
References
Configurations
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html - Exploit | |
References | () http://seclists.org/bugtraq/2015/Jun/117 - Exploit | |
References | () http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/ - | |
References | () http://www.kb.cert.org/vuls/id/899080 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/923388 - Third Party Advisory, US Government Resource | |
References | () https://community.rapid7.com/community/metasploit/blog/2013/01/23/ray-sharp-cctv-dvr-password-retrieval-remote-root - |
Information
Published : 2016-02-18 05:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8286
Mitre link : CVE-2015-8286
CVE.ORG link : CVE-2015-8286
JSON object : View
Products Affected
zhuhai
- raysharp_firmware
CWE
CWE-254
7PK - Security Features