An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.beward.net | product |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php | third party advisory exploit |
https://www.fortiguard.com/encyclopedia/ips/48618 | third party advisory |
https://s4e.io/tools/beward-n100-h264-vga-ip-camera-arbitrary-file-disclosure | technical description third party advisory |
https://packetstorm.news/files/id/151531 | exploit |
https://cxsecurity.com/issue/WLB-2019020042 | exploit |
https://vulncheck.com/advisories/beward-n100-remote-command-execution | third party advisory |