Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://possiblesecurity.com/news/vulnerabilities-of-milesight-ip-security-cameras/ | third party advisory |
http://kirils.org/slides/2016-10-06_Milesight_initial.pdf | third party advisory exploit |
https://www.youtube.com/watch?v=scckkI7CAW0 | third party advisory exploit |