| ID |
CVE-2017-7253
|
| Sažetak |
Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. The second JSON object encountered has a result indicating a successful admin login. |
| Reference |
|
| CVSS |
| Base: | 9.0 |
| Impact: | 10.0 |
| Exploitability: | 8.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
SINGLE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
03-10-2019 - 00:03 |
| Objavljeno |
30-03-2017 - 18:59 |