The manage users profile services of the network camera device allows an authenticated. Remote attackers can modify URL parameters and further amend user’s information and escalate privileges to control the devices.
Solution:
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.twcert.org.tw/tw/cp-132-4676-391a5-1.html | not applicable |
https://www.meritlilin.com/assets/uploads/support/file/M00166-TW.pdf | vendor advisory |
https://gist.github.com/keniver/86ebef688fb274b534da51ef1a84dd3e | third party advisory |
https://www.chtsecurity.com/news/0b733a38-e616-4ff3-86a6-13e710643388 | third party advisory |