header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MESSOA NIC990 IP-Camera auth bypass configuration download

This vulnerability allows an attacker to download the configuration file of the MESSOA NIC990 IP-Camera without authentication. The configuration file contains the administrator's username and password, which can be used to gain access to the camera's web interface.

TOSHIBA IK-WP41A IP-Camera auth bypass configuration download

This vulnerability allows an attacker to bypass authentication and download the configuration file of the TOSHIBA IK-WP41A IP-Camera. By sending a specially crafted HTTP request to the chklogin.cgi script, an attacker can download the configuration file without authentication.

Multiple SIEMENS IP Cameras auth bypass configuration download

This exploit allows an attacker to download the configuration file of multiple SIEMENS IP Cameras without authentication. The vulnerable cameras are SIEMENS IP Camera CCID1410-ST X.1.0.24, SIEMENS IP Camera CCMW1025 x.2.2.1798, SIEMENS IP Camera CCMS2025 x.2.2.1798, SIEMENS IP Camera CVMS2025-IR x.2.2.1798, SIEMENS IP Camera CVMS2025-IR CxMS2025_V2458, SIEMENS IP Camera CVMS2025-IR CxMS2025_V2458_SP1, and SIEMENS IP Camera CCPW5025-IR CCPWx025_V0.1.58. The attacker can access the configuration file by sending a request to the following URLs: http://TARGET/cgi-bin/chklogin.cgi?file=config.ini and http://TARGET/cgi-bin/check.cgi?file=ikwd03conf.ini

SIEMENS IP Camera CCMW1025 x.2.2.1798 remote change admin user/password

This exploit allows an attacker to remotely change the admin user and password of a SIEMENS IP Camera CCMW1025 x.2.2.1798 device. The attacker can use the GET command to send a request to the device's CGI-bin/writefile.cgi script with the new user and password parameters. This will allow the attacker to gain access to the device with the new credentials.

Cisco ASA 8.X Authentication Bypass

The exploit allows an attacker to bypass authentication on Cisco ASA 8.X devices by exploiting a vulnerability in the SNMP service. The attacker needs to have access to the SNMP service and the SNMP read (public) string. The exploit was released by the Equation Group in 2016 and tested on Cisco ASA 8.4.2.

Recent Exploits: