An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.kb.cert.org/vuls/id/896979 | third party advisory us government resource |
https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/ | third party advisory exploit |
http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html | exploit vdb entry third party advisory |