An issue was discovered in Apexis APM-H803-MPC software, as used with many different models of IP Camera. An unprotected CGI method inside the web application permits an unauthenticated user to bypass the login screen and access the webcam contents including: live video stream, configuration files with all the passwords, system information, and much more. With this vulnerability, anyone can access to a vulnerable webcam with 'super admin' privilege.
References
Link | Resource |
---|---|
https://youtu.be/B75C13Zw35Y | Exploit Third Party Advisory |
https://youtu.be/B75C13Zw35Y | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://youtu.be/B75C13Zw35Y - Exploit, Third Party Advisory |
Information
Published : 2018-02-19 19:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-17101
Mitre link : CVE-2017-17101
CVE.ORG link : CVE-2017-17101
JSON object : View
Products Affected
apexis
- apm-h803-mpc
- apm-h803-mpc_firmware
CWE