We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges.
Reserved 2025-04-15 | Published 2025-06-26 | Updated 2025-06-26 | Assigner VulnCheckCWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-20 Improper Input Validation
Gjoko Krstic of Zero Science
www.beward.net
www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php
www.fortiguard.com/encyclopedia/ips/48618
s4e.io/...-n100-h264-vga-ip-camera-arbitrary-file-disclosure
packetstorm.news/files/id/151531
cxsecurity.com/issue/WLB-2019020042
vulncheck.com/...sories/beward-n100-remote-command-execution
Support options