Lack of an authentication mechanism in KERUI Wifi Endoscope Camera (YPC99) allows an attacker to watch or block the camera stream. The RTSP server on port 7070 accepts the command STOP to stop streaming, and the command SETSSID to disconnect a user.
References
Link | Resource |
---|---|
https://utkusen.com/blog/multiple-vulnerabilities-on-kerui-endoscope-camera.html | Exploit Third Party Advisory |
https://utkusen.com/blog/multiple-vulnerabilities-on-kerui-endoscope-camera.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://utkusen.com/blog/multiple-vulnerabilities-on-kerui-endoscope-camera.html - Exploit, Third Party Advisory |
Information
Published : 2018-10-22 20:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-13115
Mitre link : CVE-2018-13115
CVE.ORG link : CVE-2018-13115
JSON object : View
Products Affected
keruigroup
- ypc99_firmware
- ypc99
CWE
CWE-20
Improper Input Validation