Логотип exploitDog
bind:CVE-2025-34058
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34058

Количество 3

Количество 3

nvd логотип

CVE-2025-34058

7 месяцев назад

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

EPSS: Низкий
github логотип

GHSA-fxxf-77p3-7rr7

7 месяцев назад

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

EPSS: Низкий
fstec логотип

BDU:2025-11582

7 месяцев назад

Уязвимость сервера потокового видео Hikvision Streaming Media Management Server, связанная со слабыми требованиями к паролю, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34058

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

1%
Низкий
7 месяцев назад
github логотип
GHSA-fxxf-77p3-7rr7

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

1%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-11582

Уязвимость сервера потокового видео Hikvision Streaming Media Management Server, связанная со слабыми требованиями к паролю, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 7.5
1%
Низкий
7 месяцев назад

Уязвимостей на страницу