Zhuhai RaySharp firmware has a hardcoded root password, which makes it easier for remote attackers to obtain access via a session on TCP port 23 or 9000.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2015/Jun/117 | Exploit |
http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html | Exploit |
http://www.kb.cert.org/vuls/id/923388 | Third Party Advisory US Government Resource |
http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/ | |
http://www.kb.cert.org/vuls/id/899080 | Third Party Advisory US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/01/23/ray-sharp-cctv-dvr-password-retrieval-remote-root |
Configurations
Information
Published : 2016-02-17 21:59
Updated : 2016-03-07 04:35
NVD link : CVE-2015-8286
Mitre link : CVE-2015-8286
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
zhuhai
- raysharp_firmware