The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2022/Jun/0 | mailing list third party advisory exploit |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt | third party advisory exploit |