The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.
References
Link | Resource |
---|---|
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2022/Jun/0 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-07-17 15:15
Updated : 2022-07-27 10:21
NVD link : CVE-2021-40149
Mitre link : CVE-2021-40149
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
reolink
- e1_zoom_firmware
- e1_zoom