Описание
TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded "qmik" account, which allows remote attackers to obtain administrative access via a TELNET session.
Уязвимые конфигурации
Конфигурация 1Версия до 1.6.18p12_sign5 (включая)
Одновременно
Одно из
cpe:2.3:h:tp-link:tl-sc3130:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sc3130g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sc3171:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sc3171g:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:lm_firmware:*:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.1778
Средний
10 Critical
CVSS2
Дефекты
CWE-255
Связанные уязвимости
github
больше 3 лет назад
TP-Link IP Cameras TL-SC3130, TL-SC3130G, TL-SC3171, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6 have an empty password for the hardcoded "qmik" account, which allows remote attackers to obtain administrative access via a TELNET session.
EPSS
Процентиль: 95%
0.1778
Средний
10 Critical
CVSS2
Дефекты
CWE-255