Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote attackers to obtain access via a TELNET session.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2013/Jun/84 | third party advisory mailing list |
https://www.youtube.com/watch?v=XkCBs4lenhI | third party advisory exploit |