CVE-2017-3223 – Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow
https://notcve.org/view.php?id=CVE-2017-3223
Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803. • http://www.securityfocus.com/bid/99620 https://www.kb.cert.org/vuls/id/547255 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •
CVE-2017-7253
https://notcve.org/view.php?id=CVE-2017-7253
Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a "Component error: login challenge!" message. • http://www.securityfocus.com/bid/97263 https://gist.github.com/anonymous/16aca69b7dea27cb73ddebb0d9033b02 • CWE-922: Insecure Storage of Sensitive Information •
CVE-2013-1605 – MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-1605
Buffer overflow in MayGion IP Cameras with firmware before 2013.04.22 (05.53) allows remote attackers to execute arbitrary code via a long filename in a GET request. Desbordamiento de buffer en MayGion IP Cameras con firmware anterior a 2013.04.22 (05.53) permite a atacantes remotos ejecutar código arbitrario a través de un nombre de archivo largo en una solicitud GET. • https://www.exploit-db.com/exploits/25813 http://osvdb.org/93708 http://packetstormsecurity.com/files/121787/MayGion-IP-Camera-Path-Traversal-Buffer-Overflow.html http://seclists.org/fulldisclosure/2013/May/194 http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities http://www.exploit-db.com/exploits/25813 http://www.securityfocus.com/bid/60196 https://exchange.xforce.ibmcloud.com/vulnerabilities/84590 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-1604 – MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-1604
Directory traversal vulnerability in MayGion IP Cameras with firmware before 2013.04.22 (05.53) allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI. Vulnerabilidad de salto de directorio en MayGion IP Cameras con firmware anterior a 2013.04.22 (05.53) permite a atacantes remotos leer archivos arbitrarios a través de un .. (punto punto) en la URI por defecto. • https://www.exploit-db.com/exploits/25813 http://seclists.org/fulldisclosure/2013/May/194 http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities http://www.exploit-db.com/exploits/25813 http://www.securityfocus.com/bid/60192 https://exchange.xforce.ibmcloud.com/vulnerabilities/84589 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •