Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-7253

Опубликовано: 30 мар. 2017
Источник: nvd
CVSS3: 8.8
CVSS2: 9
EPSS Низкий

Описание

Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:dahuasecurity:ip_camera_firmware:3.200.0001.6:*:*:*:*:*:*:*
cpe:2.3:h:dahuasecurity:ip_camera:-:*:*:*:*:*:*:*

EPSS

Процентиль: 74%
0.00837
Низкий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-922

Связанные уязвимости

CVSS3: 8.8
github
больше 3 лет назад

Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login.

EPSS

Процентиль: 74%
0.00837
Низкий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-922