Описание
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-34058
- https://blog.csdn.net/qq_40684306/article/details/115278837
- https://vulncheck.com/advisories/hikvision-streaming-server-default-creds-file-read
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-14544
- https://www.hikvision.com/en/support/cybersecurity/security-advisory
Связанные уязвимости
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Уязвимость сервера потокового видео Hikvision Streaming Media Management Server, связанная со слабыми требованиями к паролю, позволяющая нарушителю получить доступ к конфиденциальным данным