Description
JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version before 2016-08-22
Timeline
| 2016-08-22: | Vulnerability publicly disclosed and PoC available. |
Credits
Yakir Wizman
References
www.exploit-db.com/exploits/40282
web.archive.org/.../analyzing-security-cameras-products.html
pro.jvc.com/...ech_desc.jsp?model_id=MDL102145&feature_id=02
www.vulncheck.com/...amera-directory-traversal-via-check-cgi