Description
Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.
Problem types
CWE-306 Missing Authentication for Critical Function
Product status
Any version before 1.3.4
Timeline
| 2024-04-24: | Vulnerability is publicly disclosed |
Credits
SSD Secure Disclosure
References
ssd-disclosure.com/...isory-nvms9000-information-disclosure/
www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrs
undercodetesting.com/...variant-targeting-nvms-9000-devices/
www.vulncheck.com/...dmin-queries-and-information-disclosure